id,summary,reporter,owner,description,type,status,priority,component,severity,resolution,keywords,cc,release 8691,Subscriber Classes: Allow for Active Directory / Kerberos usernames,Rich,,"At present there's a simple test against the sid of the user, for example: {{{ if re.match(r'^[^@]+@.+', ticket['reporter']): sid, auth, addr = None, 0, ticket['reporter'] else: sid, auth, addr = ticket['reporter'], 1, None }}} This means that any users with a sid like user@domain.com get treated from this point forwards as unauthenticated. This has disastrous consequences e.g. their email address (in session_attribute) can never be retrieved as the where clause contains 'authenticated = 0'!",defect,closed,normal,AnnouncerPlugin,critical,wontfix,user resolver Kerberos ActiveDirectory LDAP,Ryan J Ollos Robert Corsaro,0.12