Hi,
I have just installed Spacewalk to manage my servers and I noticed that the
FreeIPA wanted to update some packages.
My FreeIPA server is Centos 7.
I notices in Spacewalk that the ipa-server package (and various bits) wanted to
update, and the relevant versions were:
Installed packages:
Natxo Asenjo wrote:
> hi,
>
> I am testing certificate authentication to ipa ldap ( centos 7.2 ).
>
> I have generated a user certificate following the instructions on
> https://blog-ftweedal.rhcloud.com/2015/08/user-certificates-and-custom-profiles-with-freeipa-4-2/
>
> After that I modified my
hi,
I am testing certificate authentication to ipa ldap ( centos 7.2 ).
I have generated a user certificate following the instructions on
https://blog-ftweedal.rhcloud.com/2015/08/user-certificates-and-custom-profiles-with-freeipa-4-2/
After that I modified my $HOME/.ldaprc with these settings:
Rob,
Yeah i forgot to attach the file when I initially sent. I also attached the
output from all the nodes. I guess what i realized is that my agreements are a
little different than i originally thought. What is also strange is on a few
hosts that initially did enroll from AWS, when I look at t
de...@pabstatencio.com wrote:
>
> I am running the latest patched CentOS 7.2, with FreeIPA 4.2.0, and I
> the Master node in the Data Center, then i created 3 replica's, one in
> the DC for High Availability, and then 2 Replica's in the AWS Cloud. I'm
> having major issues with the Replica's in th
Auerbach, Steven wrote:
> We have IPA set up in active-active mode. The first node (ipa01) logs
> errors regularly (every few minutes) that seem to be based upon an
> attempt to communicate with a replica that no longer exists.
>
>
>
> Feb 25 14:38:04 ipa01 named[2161]: LDAP query timed out. T
I am running the latest patched CentOS 7.2, with FreeIPA 4.2.0, and I the
Master node in the Data Center, then i created 3 replica's, one in the DC for
High Availability, and then 2 Replica's in the AWS Cloud. I'm having major
issues with the Replica's in the AWS Cloud. I am trying to have it so
We have IPA set up in active-active mode. The first node (ipa01) logs errors
regularly (every few minutes) that seem to be based upon an attempt to
communicate with a replica that no longer exists.
Feb 25 14:38:04 ipa01 named[2161]: LDAP query timed out. Try to adjust
"timeout" parameter
Feb 2
bahan w wrote:
> Hello everyone !
>
> I send you this mail because I'm using the python libraries and I'm
> encountering a blocking problem when trying to use the
> api.Command['group_remove_member'] command.
>
> I don't really know what is the syntax of this command.
> I know how to make work th
Hello everyone !
I send you this mail because I'm using the python libraries and I'm
encountering a blocking problem when trying to use the
api.Command['group_remove_member'] command.
I don't really know what is the syntax of this command.
I know how to make work the api.Command['user_show'](user
Hello,
comments inline
On 03.03.2016 13:11, Geselle Stijn wrote:
Hello,
We have a large Windows environment and around 50 RHEL servers (which
will grow to a few hundred in the future). Our goal is to be able to
login with our AD credentials and have sudo centrally managed. To be
able to ma
Hello,
We have a large Windows environment and around 50 RHEL servers (which will grow
to a few hundred in the future). Our goal is to be able to login with our AD
credentials and have sudo centrally managed. To be able to manage users and
their access/permissions we are looking into IdM combin
I guess I was looking at this wrongly!
Simo, you're right! Java and Kerberos wont work !
However password+OTP against LDAP server directly works! I can use that!
Thanks for your help!
On 3 March 2016 at 14:40, Prashant Bapat wrote:
> Thanks.
>
> Let me figure out possible alternatives.
>
> On
Thanks.
Let me figure out possible alternatives.
On 3 March 2016 at 00:20, Simo Sorce wrote:
>
>
> On Wed, 2016-03-02 at 16:25 +0530, Prashant Bapat wrote:
> > Thanks. But my problem is not OTP per se but Kerberos thru Java.
> > Specifically i'm getting below error.
> >
> > javax.security.auth.
14 matches
Mail list logo