|
71 |
def disable_user_from_ucs(connector, key, object): |
71 |
def disable_user_from_ucs(connector, key, object): |
72 |
return connector.disable_user_from_ucs(key, object) |
72 |
return connector.disable_user_from_ucs(key, object) |
73 |
|
73 |
|
|
|
74 |
def set_userPrincipalName_from_ucr(connector, key, object): |
75 |
return connector.set_userPrincipalName_from_ucr(key, object) |
76 |
|
74 |
def disable_user_to_ucs(connector, key, object): |
77 |
def disable_user_to_ucs(connector, key, object): |
75 |
return connector.disable_user_to_ucs(key, object) |
78 |
return connector.disable_user_to_ucs(key, object) |
76 |
|
79 |
|
|
1429 |
else: |
1432 |
else: |
1430 |
pass |
1433 |
pass |
1431 |
|
1434 |
|
|
|
1435 |
def set_userPrincipalName_from_ucr(self, key, object): |
1436 |
object_key = key |
1437 |
object_ucs = self._object_mapping(object_key,object) |
1438 |
ldap_object_ad = self.get_object(object['dn']) |
1439 |
|
1440 |
ucs_admin_object=univention.admin.objects.get(self.modules[object_key], co='', lo=self.lo, position='', dn=object_ucs['dn']) |
1441 |
ucs_admin_object.open() |
1442 |
|
1443 |
if self.baseConfig.has_key('%s/ad/mapping/kerberosdomain' % self.CONFIGBASENAME) and not ldap_object_ad.has_key('userPrincipalName'): |
1444 |
principalDomain = self.baseConfig['%s/ad/mapping/kerberosdomain' % self.CONFIGBASENAME] |
1445 |
localPart = ucs_admin_object['username'] |
1446 |
userPrincipalName = "%s@%s" % (localPart, principalDomain) |
1447 |
modlist=[(ldap.MOD_REPLACE, 'userPrincipalName', [userPrincipalName])] |
1448 |
ud.debug(ud.LDAP, ud.INFO, "set_userPrincipalName_from_ucr: set kerberos principle %s for AD user %s with modlist %s " % |
1449 |
(userPrincipalName, object['dn'], modlist) ) |
1450 |
self.lo_ad.lo.modify_s(compatible_modstring(object['dn']), compatible_modlist(modlist)) |
1451 |
|
1452 |
|
1432 |
def disable_user_from_ucs(self, key, object): |
1453 |
def disable_user_from_ucs(self, key, object): |
1433 |
object_key = key |
1454 |
object_key = key |
1434 |
|
1455 |
|