David Boreham wrote:
Hmm... What I'm trying to accomplish here is a configuration where users
authenticate to the ldap server with username/password (no kerberos
ticket) and their password is checked from kerberos. Is this possible
to do with the standard plugins? I've had a hard
Hmm... What I'm trying to accomplish here is a configuration where users
authenticate to the ldap server with username/password (no kerberos
ticket) and their password is checked from kerberos. Is this possible
to do with the standard plugins? I've had a hard time trying to figure
out how
On Fri, 2005-08-26 at 06:02 -0600, David Boreham wrote:
> FDS supports two SASL authentication mechanisms at present:
>
> EXTERNAL
> GSSAPI
>
> It doesn't use the /var/lib/sasl2/slapd.conf configuration style.
Hmm... What I'm trying to accomplish here is a configuration where users
authenticate
FDS supports two SASL authentication mechanisms at present:
EXTERNAL
GSSAPI
It doesn't use the /var/lib/sasl2/slapd.conf configuration style.
Kalle Kivistö wrote:
Howdy,
I've tried unsuccessfully to get DS to authenticate users with sasl.
I have a slapd.conf in /var/lib/sasl2 that looks like
FDS supports two SASL authentication mechanisms at present:
EXTERNAL
GSSAPI
It doesn't use the /var/lib/sasl2/slapd.conf configuration style.
Kalle Kivistö wrote:
Howdy,
I've tried unsuccessfully to get DS to authenticate users with sasl.
I have a slapd.conf in /var/lib/sasl2 that looks like
Howdy,
I've tried unsuccessfully to get DS to authenticate users with sasl.
I have a slapd.conf in /var/lib/sasl2 that looks like this:
pwcheck_method: saslauthd
saslauthd_path: /var/run/saslauthd/mux
and a sasl-mapping that looks like this:
Regex: .*
Search Base DN: ou=People, dc=my, dc=domain