Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-11 Thread Fernando Coelho
Still not working. When I added krb5 { } at the radius.conf file, it gave me the following error at startup /usr/local/etc/raddb/radiusd.conf[589]: Unexpected end of section Errors reading radiusd.conf Regards, 2008/2/8, [EMAIL PROTECTED] [EMAIL PROTECTED]: Hi, Thank you all. But

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-09 Thread Phil Mayers
Jeffrey Hutzelman wrote: --On Friday, February 08, 2008 08:19:32 PM + [EMAIL PROTECTED] wrote: you MAY need to set Auth-Type = krb5 for the required user or NAS setting depending on your config! You will almost certainly have to do something -- there is no way for the rlm_krb5 module

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-09 Thread Jeffrey Hutzelman
--On Saturday, February 09, 2008 12:18:54 PM + Phil Mayers [EMAIL PROTECTED] wrote: Note that this violates the general advice of never setting Auth-Type, explicitly; this is necessary because rlm_krb5 does not provide any authorize handling and will not set Auth-Type automatically like

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-09 Thread Alan DeKok
Jeffrey Hutzelman wrote: It can't, really. But what it could do is what rlm_pap does, which is to assume that if there's a password in the request and Auth-Type isn't set yet, you must want to use this module (actually, rlm_pap also requires there be a password or hash in the users database,

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-08 Thread Ivan Kalik
Depends on the router. You will have to read router documentation. For Cisco it's ppp authentication mschap on the interface. User's machine trying to connect will also need to support mschap. Ivan Kalik Kalik Informatika ISP Dana 8/2/2008, Fernando Coelho [EMAIL PROTECTED] piše: Hi Ivan! How

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-08 Thread A . L . M . Buxey
Hi, Thank you all. But how do I do this? Does any one has a tutorial about it? add the required parts to the radius config files to enable krb5 (direct password check) against the AD - you will also need to ensure your kerberos environment is sane and works eg run the command kinit

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-08 Thread Fernando Coelho
Thank you all. But how do I do this? Does any one has a tutorial about it? Best regards, 2008/2/4, Jeffrey Hutzelman [EMAIL PROTECTED]: --On Saturday, February 02, 2008 06:50:32 PM + Markus Moeller [EMAIL PROTECTED] wrote: You can use pam with a pam_krb5 module to authenticate users

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-08 Thread Jeffrey Hutzelman
--On Friday, February 08, 2008 08:19:32 PM + [EMAIL PROTECTED] wrote: you MAY need to set Auth-Type = krb5 for the required user or NAS setting depending on your config! You will almost certainly have to do something -- there is no way for the rlm_krb5 module to know that you want to

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-03 Thread Jeffrey Hutzelman
--On Saturday, February 02, 2008 06:50:32 PM + Markus Moeller [EMAIL PROTECTED] wrote: You can use pam with a pam_krb5 module to authenticate users to AD. Alternately, there is a perfectly good rlm_krb5 in FreeRADIUS. - List info/subscribe/unsubscribe? See

Re: Using freeradius integrated with Active Directory toautenticatecisco passwords

2008-02-02 Thread Markus Moeller
You can use pam with a pam_krb5 module to authenticate users to AD. Markus Ivan Kalik [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] rad_recv: Access-Request packet from host 10.131.23.252:1645, id=84, length=79 NAS-IP-Address = 10.131.23.252 NAS-Port = 11