Hello
I store the expiration date as a radius attribute inside the LDAP (radius
profile object class).
But where I check this value and where i call the script? in which module?
The think is clear i do not know where to configure it, in which file. For
example, the echo module is clear, if
hello,
please i need to know how to call an external script one the users is
expired.
I got radius call an external script once the user is authenticated with
success by using the echo module, but now I need to call another script when
the user tries to connect after expiration date.
Any idea
hello,
please i need to know how to call an external script one the users is
expired.
I got radius call an external script once the user is authenticated with
success by using the echo module, but now I need to call another script when
the user tries to connect after expiration date.
Any idea
Hello,
I want freeradius calls an external script and send to it the User-Name it
gets from the NAS in an access-request radius packet.
So I am using the echo module, I configure as:
#
# The name of the program to execute, and it's
# arguments. Dynamic translation is done on
Like this?
DEFAULT guests-Ldap-Group == "cn=wlanguests,ou=Groups,dc=CELLS,dc=ES",
Expiration := 09 Oct 2009 17:00, Auth-Type = LDAPGUESTS
Because with this radius says:
/etc/raddb/users[65]: Parse error (check) for entry DEFAULT: Expected end of
line or comma
and i tried to add a comma at the e
ke to do
that in a per ldap group basis.
if (LDAP-Group == blah) {
update control {
Expiration := ""
}
}
in which file do I confiugre
Alexander Clouter wrote:
>
> Hi,
>
> aangles wrote:
>>
>> I would Like to know if ther
Hello,
In which file i configure the Ldap-Group Expiration?
thanks
Ivan Kalik wrote:
>
>> I would Like to know if there is a way to define an expiration time for
>> all
>> those users which belong to an LDAP Group, instead of defining this
>> attribute for each of those users?
>
> if(Ldap-Gr
Hello,
I would Like to know if there is a way to define an expiration time for all
those users which belong to an LDAP Group, instead of defining this
attribute for each of those users?
Moreover, after expiration time , RADIUS send an access-reject to the user.
Is there any tool or something tha
thank you very much Kalik.
Now it works!! :)
Ivan Kalik wrote:
>
>>
>> Ok. I set that parameter you comment: use_tunneled_reply = yes and it
>> does
>> not sent the VSA in the access-accept which I think that if radius could
>> sent this VSA atributed inside an access-accept paquet then the NA
Ok!! I'm sorry, it was not a good idea introducing wireshark print screens.
Yeah its better to put here a log of my freeradius , which it is the issue
we talk about. I didn't though with that. Here is my log of freeradius. As
see, only some Aruba-VSA is sent not in the Access-Accept, but inside so
Ivan Kalik wrote:
>
>>
>> have freeradius 2.1, and the configuration of my users file is like the
>> following:
>>
>> ...
>> DEFAULT Auth-Type = LDAP
>> Aruba-User-Vlan = 20,
>> Fall-Through : = 1
>>
>>
>> once I do radiusd -X, I see only the first access-challenge with the
>> Aruba-User-V
have freeradius 2.1, and the configuration of my users file is like the
following:
...
DEFAULT Auth-Type = LDAP
Aruba-User-Vlan = 20,
Fall-Through : = 1
once I do radiusd -X, I see only the first access-challenge with the
Aruba-User-Vlan Attirbute, and no more access-challenges have this
at
12 matches
Mail list logo