Not sure what’s happening here, but for some reason, AD is now rejecting the
user I created for use with LTB for insufficient privileges (error 50). This
user was specifically created with the minimum rights to change passwords. I’m
using Self-service password v1.1, and this was working fine a couple of weeks
ago. I have not altered the Windows server (other than to install Microsoft’s
patch updates over time) or the special user I set up for the purpose of
letting LTB change passwords. I’m stumped.
If I give the LTB user domain admin rights, everything works just fine, so it
isn’t a communication issue with the server. Any idea what this could be?
One thing I noticed is that the entire delegate control wizard does not seem to
offer the privileges I was used to seeing in the past. For example, Write
lockout time and write shadowlastchange are nowhere to be found…
Thanks!
Gray
Gray McCord
Adapt, Mutate, Migrate, or Die
-C. Darwin
_______________________________________________
ltb-users mailing list
[email protected]
https://lists.ltb-project.org/cgi-bin/mailman/listinfo/ltb-users