lp_ctx,
AUTHN_POLICY_AUTH_TYPE_NTLM,
user_info_dc,
+ NULL /* device_info */,
+ (struct auth_claims) {},
authn_server_policy,
+ (struct authn_policy_flags) {},
&server_audit_info);
if (server_audit_info != NULL) {
*server_audit_info_out = talloc_move(mem_ctx, &server_audit_info);
struct loadparm_context* lp_ctx,
const enum authn_policy_auth_type auth_type,
const struct auth_user_info_dc *user_info,
+ const struct auth_user_info_dc *device_info,
+ const struct auth_claims auth_claims,
const struct authn_server_policy *server_policy,
+ const struct authn_policy_flags authn_policy_flags,
struct authn_audit_info **server_audit_info_out)
{
NTSTATUS status = NT_STATUS_OK;
samdb,
lp_ctx,
user_info,
- NULL /* device_info */,
- (struct auth_claims) {},
+ device_info,
+ auth_claims,
&server_policy->policy,
authn_int64_none() /* tgt_lifetime_raw */,
event,
- (struct authn_policy_flags) {},
+ authn_policy_flags,
restrictions,
server_audit_info_out);
return status;
struct loadparm_context* lp_ctx,
enum authn_policy_auth_type auth_type,
const struct auth_user_info_dc *user_info,
+ const struct auth_user_info_dc *device_info,
+ const struct auth_claims auth_claims,
const struct authn_server_policy *server_policy,
+ const struct authn_policy_flags authn_policy_flags,
struct authn_audit_info **server_audit_info_out);
/* Create a structure containing auditing information. */
lp_ctx,
AUTHN_POLICY_AUTH_TYPE_KERBEROS,
client_info,
+ NULL /* device_info */,
+ (struct auth_claims) {},
server_policy,
+ (struct authn_policy_flags) {},
server_audit_info_out);
if (!NT_STATUS_IS_OK(status)) {
if (status_out != NULL) {