Milton Calnek wrote:
Hello all,
I'm trying to authenticate shell login's against an MS-ADS. I don't
have admin access to the ADS, but I can talk to the admins.
I have gotten as far as getting authentication working, but the uid's
depend on the order of login. ie: the first guy to login get
On Fri, 1 Feb 2008 09:49:47 -0600
"Jeff Larsen" <[EMAIL PROTECTED]> wrote:
> > 1. I have the same problem, but the admin does not want to
> > install Microsoft Services For UNIX.
>
> That's unfortunate. It's really quite non-invasive
The admin does not want to do any change to deal with only 1 u
[EMAIL PROTECTED] wrote:
The admin does not want to do any change to deal with only 1 user
[me], so there is no other way than XP within vmware?
if you're the only one using this linux system, well, I guess I can see
his POV. OTOH, if this Linux system is providing a business function,
On Feb 1, 2008 10:20 AM, <[EMAIL PROTECTED]> wrote:
> On Fri, 1 Feb 2008 09:49:47 -0600
> "Jeff Larsen" <[EMAIL PROTECTED]> wrote:
>
> > > 1. I have the same problem, but the admin does not want to
> > > install Microsoft Services For UNIX.
> >
> > That's unfortunate. It's really quite non-invasiv
On Feb 1, 2008 9:38 AM, Michael Semcheski <[EMAIL PROTECTED]> wrote:
> So is it possible to use nss_ldap with MS-AD if the Services for Unix
> are not installed? Or do you still have to resort to "/etc/password
> monkey business"? (I'm all for eliminating the monkey business, but I
> don't think
On Feb 1, 2008 9:38 AM, <[EMAIL PROTECTED]> wrote:
> On Thu, 31 Jan 2008 20:29:07 -0600
> "Jeff Larsen" <[EMAIL PROTECTED]> wrote:
>
> > Don't use Samba.
> >
> > Microsoft Services For UNIX or 2003R2 support UNIX attributes in
> > Active Directory. It adds a new tab in the user account
> > propert
On Jan 31, 2008 9:29 PM, Jeff Larsen <[EMAIL PROTECTED]> wrote:
> Microsoft Services For UNIX or 2003R2 support UNIX attributes in
> Active Directory. It adds a new tab in the user account properties
> where you can specify login shell, home directory, uid, gid.
>
> On the CentOS side use nss_ldap.
On Thu, 31 Jan 2008 20:29:07 -0600
"Jeff Larsen" <[EMAIL PROTECTED]> wrote:
> Don't use Samba.
>
> Microsoft Services For UNIX or 2003R2 support UNIX attributes in
> Active Directory. It adds a new tab in the user account
> properties where you can specify login shell, home directory,
> uid, gid.
On Jan 31, 2008 2:51 PM, Milton Calnek <[EMAIL PROTECTED]> wrote:
> Hello all,
>
> I'm trying to authenticate shell login's against an MS-ADS. I don't
> have admin access to the ADS, but I can talk to the admins.
>
> I have gotten as far as getting authentication working, but the uid's
> depend on
What I did was create the users in /etc/passwd with the same username
as you would find in the AD.
Then, its just a matter of enabling Kerberos authentication, and using
the Domain Controllers as KDC's.
Maybe not what you're looking for, but its simple and effective. No
samba involved.
On Jan
Hello all,
I'm trying to authenticate shell login's against an MS-ADS. I don't
have admin access to the ADS, but I can talk to the admins.
I have gotten as far as getting authentication working, but the uid's
depend on the order of login. ie: the first guy to login gets 1,
the next get
11 matches
Mail list logo