Am Tue, 1 Jan 2013 23:50:20 -0800
schrieb fal patel fal0pa...@gmail.com:
Hey Quanah,
Oh no, my question was whether an arbitrary external variable (eg.
URI1) could be set (eg. to ldap://host1.hq.mycompany.com:389/) inside
an LDIF file and used in subsequent places in the file.
(to avoid
On 13/12/2012 18:00, cbulist wrote:
Hi,
We have a problem using Red Hat 5.7, gdm 2.16.0-59 y pwdPolicy.
When an account gets pwdMaxAge limit and the user try to login using
GUI the user doesn't receive any warning about expiration account, it
just requests the user and password like a normal
Hi my friends i have the next problem
when mi server is down for electrical fails my ldap db is corrupt
I need some procedure to restore de db because until this moment I restore but
from a backup but i thing that is not the better strategy
I realy need your help!!!
Atento a sus
On Wed, Jan 02, 2013 at 09:14:43AM -0500, Jorge Armijo wrote:
Hi my friends i have the next problem
when mi server is down for electrical fails my ldap db is corrupt
I need some procedure to restore de db because until this moment I restore
but from a backup but i thing that is not the
The getent passwd returns all the users defined in both the internal and the
external ldap servers. When I turned on the debug for pam_ldap, I saw
su: pam_ldap: could not open secret file /etc/pam_ldap.secret (No such file or
directory)
su: pam_ldap: error trying to bind as user
On 01/02/13 11:43 -0800, Wu, James C. wrote:
The getent passwd returns all the users defined in both the internal and
the external ldap servers. When I turned on the debug for pam_ldap, I saw
su: pam_ldap: could not open secret file /etc/pam_ldap.secret (No such file or
directory)
su:
Greetings and Salutations.
December 20, I converted from bdb to mdb. Now my memory usage looks like
this: http://faculty.ycp.edu/~ksmith8/openldap_stats.png
I am concerned with the graph for superman. How can I start tracking down
the usage and why almost 50% of my memory is being consumed.
--On Wednesday, January 02, 2013 4:35 PM -0500 Kyle Smith
alacer.cogita...@gmail.com wrote:
Greetings and Salutations.
December 20, I converted from bdb to mdb. Now my memory usage looks like
this: http://faculty.ycp.edu/~ksmith8/openldap_stats.png
I am concerned with the graph for
Hi,
You are right. In the pam_ldap configuration, I only specified the external
LDAP servers and configured the external server to refer query for the
sub.example.com to the internal servers.
I tried ldapsearch with -w option on both the internal and the external
servers. Both succeeded.
To answer your first question, I do not know which ldap server returns the
Invalid Credentials. --james
-Original Message-
From: Wu, James C.
Sent: Wednesday, January 02, 2013 2:16 PM
To: 'Dan White'
Cc: openldap-technical@openldap.org
Subject: RE: sasl Kerberos authentication with
When I add uid to the -D flag in the ldapwhoami, then it failed on both the
external and internal ldap servers.
ldapwhoami -x -H ldap://internalldap -D
uid=peter,ou=People,ou=sub,dc=example,dc=com -w password
ldapwhoami -x -H ldap://externalldap -D
uid=peter,ou=People,ou=sub,dc=example,dc=com
Hey Dieter,
Thank you very much for your email.
It turns out that in RedHat the overlays are automatically installed, and
so should not be loaded again with olcModuleLoad.
Thanks very much for your advice! On to the next problem:
I can't understand what in the world could be causing the
On Wed, 2 Jan 2013, fal patel wrote:
Thanks very much for your advice! On to the next problem:
I can't understand what in the world could be causing the following error:
dnPrettyNormal: cn=config
dnPrettyNormal: cn=config, cn=config
*= str2entry: str2ad(changetype): attribute type
On 12/31/12 11:19 -0800, Wu, James C. wrote:
I have tested that the LDAP authentication through saslauthd using
Kerberos works well on both the internal ldap and Kerberos pair and the
external ldap Kerberos pair.
How did you verify authentication was working with your internal server?
For
Hi,
Actually 'peter' is not the right user t test against because its password in
the internal ldap server is defined as {SASL}pe...@example.com. It should be
{SASL}pe...@sub.example.com.
I tested againt another user mark whose password is {SASL}m...@sub.example.com.
Both the ldapsearch and
-Original Message-
From: Dan White [mailto:dwh...@olp.net]
Sent: Wednesday, January 02, 2013 7:18 PM
To: Wu, James C.
Cc: openldap-technical@openldap.org
Subject: Re: sasl Kerberos authentication with subordinate
On 12/31/12 11:19 -0800, Wu, James C. wrote:
I have tested that the LDAP
When I used ldapsearch -d -1 -x -H ldap://externalldaphost -b
ou=people,ou=sub,dc=example,dc=com -D dc=example,dc=com uid=mark -w password
On the server side, I got
50e4fd04 connection_read(20): checking for input on id=1050
ber_get_next
ldap_read: want=8, got=0
50e4fd04 ber_get_next on fd
Dieter Klünter wrote:
Am Tue, 1 Jan 2013 23:50:20 -0800
schrieb fal patel fal0pa...@gmail.com:
Assuming not, I typed in each value into all its relevant places in
my LDIF file and re-ran slapadd.
Now it gives me the following error (on latest redhat 64bit):
loaded module syncprov.la
*module
18 matches
Mail list logo