Craig T wrote:
Hi,
Has anyone successfully deployed OpenLDAP for central auth in a very mixed unix
environment? With Host based access control? Plus any documentation would be
really great.
My needs;
- Central Auth
- Host based access control (e.g. user John from group accounts can't log
I can vouch for cent5/6... And 6 seems to prefer SSSD - no /etc/[pam_]ldap.conf
but an sssd.conf instead - which I understand is the preferred method now in
Fedora too (using SSSD which can also replace NSCD).
I noticed that someone felt the need to rewrite PADL's PAM plugin for Cent6,
but it
Raffael Sahli wrote:
- Caching for Client logins on laptops. I figure SSSD will be useful here?
I guess you mean userpassword caching? Then the nscd Daemon is your
friend. Or do you mean credential caching for one session with Single
Sign On, then a kerberos setup is you best option.
nscd is
Thanks for the quick response everyone..
I've been reading up on the pam.conf (pam_groupdn) entries, it sounds pretty
much perfect. No complicated access-rules in openldap to write, only catch is
that it can only handle one group in the pam_groupdn
cn=GroupName,ou=OUName,dc=example,dc=net
Craig T wrote:
Thanks for the quick response everyone..
I've been reading up on the pam.conf (pam_groupdn) entries, it sounds pretty much
perfect. No complicated access-rules in openldap to write, only catch is that it can only
handle one group in the pam_groupdn
Now i followed some pages to extend the schema with ldif-files.
Like this https://help.ubuntu.com/11.04/serverguide/C/kerberos-ldap.html
Or this
http://www.howtoforge.com/postfix-virtual-hosting-with-ldap-backend-and-with
-dovecot-pop3-imap-on-ubuntu-8.10
But when I try to
ldapadd -x -D
Hi Craig,
Hi,
Has anyone successfully deployed OpenLDAP for central auth in a very mixed
unix environment? With Host
based access control? Plus any documentation would be really great.
My needs;
- Central Auth
- Host based access control (e.g. user John from group accounts can't log
Hello.
I am new to this list so please forgive any protocol violations :)
I am starting with simple steps towards our goal to use the openldap server translucent overlay config to merge AD authentication for people at our company with local ldap account authentication for
non-company people.
--On Monday, December 19, 2011 12:39 PM +0100 Andreas Cieslak
andr...@kado-web.de wrote:
Now i followed some pages to extend the schema with ldif-files.
Like this https://help.ubuntu.com/11.04/serverguide/C/kerberos-ldap.html
Or this
Hello,
I'm currently work on project doing the same thing. I just thought I
would mention something that was not mentioned yet.
The Solaris OS does LDAP completely different.
Examples:
Linux - you edit the nsswitch.conf file
Solaris - you edit the nsswitch.ldap file which then overwrites the
I have a problem that has just started happening in the last few
weeks. Replication of modifications and/or adds from one LDAP node to
the other will work fine ( repl time 1s) for a while, then suddenly
stop working all together. The only way to get replication working
again is to restart each
--On Monday, December 19, 2011 5:31 PM -0700 david m dmal...@gmail.com
wrote:
OS: OpenSuse 11.1 64-bit w/ 2GB RAM
Version: OpenLDAP 2.4.23
Network Setup: 2 read/write nodes, with delta syncrepl between the nodes
I'm not sure what you mean by 2 read/write nodes here. delta-syncrepl does
not
I'm attempting to get pass-though auth to work against saslauthd and
kerberos and while the problem seems to be in sasl I think it's most
likely to be seen in this type of configuration with opendap which I
why I chose this mailing list.
When I run testsaslauthd it works but when I run ldapsearch
I still have *exactly* the same problem (testsaslauthd works, but
ldapsearch failed with a timeout of 10-15s).
My OpenLDAP version is 2.4.21, I think my next step is upgrade to
2.4.28, maybe this will help, but.
On 12/20/2011 05:08 AM, Jeff B wrote:
I'm attempting to get pass-though auth
14 matches
Mail list logo