<feed xmlns='http://www.w3.org/2005/Atom'>
<title>libnss-tacplus.git/debian/control, branch master</title>
<subtitle>NSS plugin to lookup tacacs client username, and match mapped user after login (mirror of https://github.com/vyos/libnss-tacplus.git)
</subtitle>
<id>https://git.amelek.net/vyos/libnss-tacplus.git/atom?h=master</id>
<link rel='self' href='https://git.amelek.net/vyos/libnss-tacplus.git/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libnss-tacplus.git/'/>
<updated>2024-04-29T18:58:47+00:00</updated>
<entry>
<title>Import version 1.0.4-cl5.1.0u11 from Cumulus Linux</title>
<updated>2024-04-29T18:58:47+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2024-04-29T18:58:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libnss-tacplus.git/commit/?id=049d2843b521d15e2f355430d94eb9d2e83311be'/>
<id>urn:sha1:049d2843b521d15e2f355430d94eb9d2e83311be</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add support for mgmt vrf</title>
<updated>2017-05-23T23:34:57+00:00</updated>
<author>
<name>Dave Olson</name>
<email>olson@cumulusnetworks.com</email>
</author>
<published>2017-03-07T20:59:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libnss-tacplus.git/commit/?id=52aa2d434ed03f0a386eb3bb6a12cb83b0c005c6'/>
<id>urn:sha1:52aa2d434ed03f0a386eb3bb6a12cb83b0c005c6</id>
<content type='text'>
When management vrf is enabled and vrf is present in the tacacs config,
if we are unable to reach any configured tacacs server, try setting
vrf context on the socket.

Previously libnss-tacplus worked only with ssh@mgmt, now works with normal
ssh in mgmt vrf

Setting via the socket (rather than vrf context) is required so we don't
set the VRF context for arbitrary processes that do uid or username
lookups.
</content>
</entry>
<entry>
<title>Fix 32-bit system build error</title>
<updated>2016-10-06T21:20:11+00:00</updated>
<author>
<name>Dave Olson</name>
<email>olson@cumulusnetworks.com</email>
</author>
<published>2016-08-20T06:57:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libnss-tacplus.git/commit/?id=3279fbbb9e0f3744623fbb6a2d658d6ff5ab3f0d'/>
<id>urn:sha1:3279fbbb9e0f3744623fbb6a2d658d6ff5ab3f0d</id>
<content type='text'>
size_t is only an int on 32 bit ARM, so %ld gives an error.  Add a cast.
</content>
</entry>
<entry>
<title>Provide getpwnam_r entry point to lookup mapped TACACS+ users</title>
<updated>2016-06-28T22:45:47+00:00</updated>
<author>
<name>Dave Olson</name>
<email>olson@cumulusnetworks.com</email>
</author>
<published>2016-06-23T20:39:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libnss-tacplus.git/commit/?id=ab9634da79286d2f04f40011331f2feee208e513'/>
<id>urn:sha1:ab9634da79286d2f04f40011331f2feee208e513</id>
<content type='text'>
Initial version with NSS lookups for tacacs users using mapping
Works with modified libpam-tacplus to authenticate TACACS+ users
without local passwd entries, mapping them to tacacs0..15 based on
TACACS privilege level.

When the /etc/tacplus_servers tacacs config file is mode 600 (normally
the case since it has the server "secret" key), lookups will only work
for tacacs users that are logged in, via the local mapping.  For root,
getpwnam lookups will work for any TACACS user known to the servers.

Most syslog's enabled only if debug is set in the config file.
</content>
</entry>
</feed>
