On Sat, 04 Apr 2015, Coy Hile wrote:
Hi all,
What purpose does this package serve? The way I’ve done Kerberos
between Active Directory and AD, the trust was always one way
(outgoing): the MIT realm is authoritative and AD “shadow accounts”
were mapped to ‘real’ principals via the
On Sat, 2015-04-04 at 01:07 -0400, Coy Hile wrote:
Hi all,
What purpose does this package serve? The way I’ve done Kerberos
between Active Directory and AD, the trust was always one way
(outgoing): the MIT realm is authoritative and AD “shadow accounts”
were mapped to ‘real’ principals via
Hi all,
What purpose does this package serve? The way I’ve done Kerberos between
Active Directory and AD, the trust was always one way (outgoing): the MIT realm
is authoritative and AD “shadow accounts” were mapped to ‘real’ principals via
the alternateSecurityID attribute. Looking at what