-
### What software would you like us to add to wolfi-os. Ideally include a URL to the project and its source.
Name: System Security Services Daemon
Source: https://github.com/SSSD/sssd
Alpine: https…
-
**Name**: sssd
**CVEs**: ~~[CVE-2021-3621](https://nvd.nist.gov/vuln/detail/CVE-2021-3621)~~, [CVE-2023-3758](https://nvd.nist.gov/vuln/detail/CVE-2023-3758)
**CVSSs**: ~~8.8~~, 7.1
**Action Needed…
-
### Description
Currently, authentication for users obtained through the SSSD provider is, or appears to be, via username and password only.
It would be useful if the SSSD provider could be extended…
-
**Describe the benefit this feature would provide to the project**
Reduce the attack surface
**Describe the solution you'd like**
authselect provides the following default profiles:
```
❯ aut…
-
I am testing sssd integration using the config from https://raw.githubusercontent.com/glauth/glauth/refs/heads/master/v2/sample-simple.cfg
and https://glauth.github.io/docs/ssh-sssd.html
Both gla…
-
I see in doc and sample-simple.cfg that ssh keys can be stored in glauth config. Is there some documentation or example how to make use of them to enable passwordless ssh login?
-
**Describe the bug**
Hello I try to integrate LLDAP with sssd
I have an attribute uidnumber to my user and can request it with ldapsearch
but when sssd try ti request LLDAP I have this error
…
-
### Explain what happens
I have set up a Fedora server VM to join AD in order to manage authentication and authorization using SSSD. As a small QoL improvement it would be nice to set the default dom…
-
### Description
Currently, when using the SSSD federation provider, if a user that has not logged into keycloak logs in for the first time, their user is imported from SSSD. This includes creating …
-
When using the following `sssd.conf` snippet:
```conf
[domain/foo]
auth_provider = proxy
proxy_pam_target = foo
```
...and the following PAM service configuration at `/etc/pam.d/foo`:
…