Custom Query (35 matches)


Show under each result:

Ticket Summary Status Owner Type Priority Milestone
#1041 [S] Authkit cookie sets user's OpenID in plain text new pjkersha defect blocker NDG3
#1095 [S] M2Crypto bug reading X.509 Certificate Extensions new pjkersha defect critical CMIP5 Security
#1115 [S] OpenID Provider SSL validation broken on ndg_security 1.5.7 new pjkersha defect critical
#1127 OpenID login fails at PCMDI with IE8 new somebody defect critical
#1125 [ndg_saml] error checking in response to time new pjkersha defect major milestone1
#1126 OpenID Provider should warn user if someone else is already signed in new somebody defect major
#1128 Cannot login to Gateway 1.3.0M4 release new pjkersha defect major
#1129 [S][XACML] Add support for time-bound access conditions assigned pjkershaw enhancement major
#1130 [XACML] Bug in [Subject|Resource|Action|Environment]Match combination assigned pjkersha defect major
#1134 NDG Security Missing template files for OpenID Relying Party new somebody defect major
#1135 NDG Security OpenID Relying Party paster template doesn't create a log directory new somebody defect major
#1137 ndg_saml_client doesn't work through https proxy new somebody defect major
#1132 [XACML] AttributeValue for DataType values other than string not parsed in policies new somebody defect minor
#1133 NDG Security not compatible with SQLAlchemy 0.7 new somebody defect minor
#1136 MyProxyClient: Warn when certificates directory is empty new somebody enhancement minor
#1138 Clock skew tolerance is too conservative new somebody defect minor
#635 [S] Support for Certificate Revocation Lists (CRLs) assigned pjkersha task desirable CMIP5 Security
#1008 [S] Python OWS Client Security assigned pjkersha task required NDG3
#1061 [S] ESG Federation Registration Interface new pjkersha task required CMIP5 Security
#1062 [S] ESG Federation OpenID Site Whitelisting new pjkersha task required CMIP5 Security
#1092 [S] Script needed to keep services in the ESG federation up to date with trust roots new pjkersha task required CMIP5 Security
#1094 [S] Apply for Separate Certificates for Security Services. new aharwood defect desirable CMIP5 Security
#1097 [S] Change trust root configuration for services from named file to directory based new pjkersha issue desirable CMIP5 Security
#1099 [S] Extend logging to enable audit log to Database new pjkersha task desirable CMIP5 Security
#1100 [S] Modify SSL Client Authn Filter to Parse SAML Assertion Certificate Extension for Attributes new pjkersha task required CMIP5 Security
#1105 [S] Integrate Secured PyDAP Client extension into new pjkersha task required CMIP5 Security
#1106 [S] Test Authentication Services with wildcard cookie domain new pjkersha task required CMIP5 Security
#1110 [S] Modify Policy Enforcement Point Filter to add Attributes pushed from OpenID Sign in / SSL Authn new pjkersha defect required CMIP5 Security
#1116 [S][XACML] Add functionality to Support PolicySets new pjkersha task desirable
#1117 [S][SAML] Add Console test scripts for launching SAML Client Queries new pjkersha task desirable
#1118 [S] Fix SSL Authentication WSGI so that cookie expiry is co-ordinated correctly with cert expiry new pjkersha defect required
#1120 [S] Possible non-release of database connections with NDG Security code base new pjkersha defect desirable
#1121 [S] Secured URLs can be cached by proxy servers new pjkersha defect required
#1123 [S] MyProxy Client enforce signing policy file new pjkersha defect required
#1124 [S] API for consumer app to interogate OpenID AX parameters new pjkersha task desirable
Note: See TracQuery for help on using queries.