Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2014-02-12 | Recursive PKGREVISION bump for OpenSSL API version bump. | tron | 1 | -2/+2 | |
2014-01-01 | Recursive PKGREVISION bump for libgcrypt-1.6.0 shlib major bump. | wiz | 1 | -2/+2 | |
2012-12-16 | recursive bump from cyrus-sasl libsasl2 shlib major bump. | obache | 1 | -1/+2 | |
2012-11-08 | Update crudesaml to 1.4: fix build problems | manu | 1 | -2/+1 | |
2012-10-23 | Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. | asau | 1 | -2/+1 | |
2012-09-15 | recursive bump from libffi shlib major bump | obache | 1 | -2/+2 | |
(additionaly, reset PKGREVISION of qt4-* sub packages from base qt4 update) | |||||
2012-06-14 | Recursive PKGREVISION bump for libxml2 buildlink addition. | sbd | 1 | -2/+2 | |
2012-03-03 | Recursive bump for pcre-8.30* (shlib major change) | wiz | 1 | -2/+2 | |
2012-02-06 | Revbump for | wiz | 1 | -2/+2 | |
a) tiff update to 4.0 (shlib major change) b) glib2 update 2.30.2 (adds libffi dependency to buildlink3.mk) Enjoy. | |||||
2011-04-22 | recursive bump from gettext-lib shlib bump. | obache | 1 | -1/+2 | |
2009-12-03 | Fix destdir installation. | joerg | 1 | -2/+2 | |
2009-09-13 | SASL is a method for adding authentication support to connection-based | manu | 3 | -0/+34 | |
protocols. To use SASL, a protocol includes a command for identifying and authenticating a user to a server and for optionally negotiating protection of subsequent protocol interactions. If its use is negotiated, a security layer is inserted between the protocol and the connection. PAM provides a way to develop programs that are independent of authentication scheme. These programs need "authentication modules" to be attached to them at run-time in order to work. Which authentication module is to be attached is dependent upon the local system setup and is at the discretion of the local system administrator. This package contains a SASL plugin and a PAM module that perform a crude check on a SAML authentication assertion. The assertion signature and date are verified, and access is granted on behalf ot the user taked for a onfigurable attribute. The only protection against replay attacks is the assertion validity dates checks, this authentication is therefore secure only if the SAML authentication assertion remains secret. The assertion has the same role as a web cookie used for authentication. |