Just as a follow up to this, on ~5% of our hosts (RHEL[456]), crond
would be unable to connect to the ldapserver after /etc/ldap.conf was
updated to use SSL. Restarting crond fixed the issue.
On Thu, Jul 19, 2012 at 10:54 AM, David Nguyen wrote:
> The cert is self-signed, but by different C
s one for days
David
On Thu, Jul 19, 2012 at 6:34 AM, Carsten Grzemba wrote:
> Hi,
>
> what kind of certificate do you use, selfsigned? Are the certificates signed
> by the same CA?
>
>
>
> Am 18.07.12, schrieb David Nguyen :
>
> Hi all,
>
> I have a strange
Hi all,
I have a strange one. My current setup is working perfectly. client1
is able to connect to ldap-server1 via SSL and everything is working
correctly. I then had a need to add another ldap server (ldap-server2)
as a multi-master replica and everything is working (user auth, sudo
via ldap u
Hi All,
I have TLS connections working and would like to disable non-SSL
connections (ie unencrypted traffic). Same situation as what was
asked below in 2007:
http://lists.fedoraproject.org/pipermail/389-users/2007-October/006347.html
Is this possible with the latest version of 389 DS?
Thanks
Hi all,
I noticed that logins via ssh key bypass the LDAP password policies
(password ageing, password warning, and password lockout due to failed
attempts, etc). Is there any way to force key based ssh logins to
respect the password
policies?
I noticed that if I use the shadow attributes in LDA