Kerberos mailing list [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos
For what it's worth, NCSU uses krb524.zip off of:
ftp://ftp.cmf.nrl.navy.mil/pub/kerberos5/
(thanks, Mr. Hornstein), with a newer conv_creds.cpp copied out of the KfW
sources.
Same for anyone else who uses:
http://www.rose-hulman.edu/TSC/software/wake/documentation/compiling/krb524/
(thanks, Mr.
Pascal == __stdcall in the Microsoft world
Frank Balluffi wrote:
Jeffrey,
The pascal calling convention is now obsolete (see http://msdn.microsoft.com/library/en-us/vclang/html/_core_obsolete_calling_conventions.asp). The current choices are listed at http://msdn.microsoft.com/library/en-us/vcla
(Please *don't* cc "kerberos-bounces" on messages to the kerberos and
krbdev mailing lists. There's a reason it's the sender and *not* in
the "from" or recipient fields. All that's there is a program trying
to parse incoming messages to decide who needs deleting from the
mailing list. If your ma
Jeffrey,
The pascal calling convention is now obsolete (see
http://msdn.microsoft.com/library/en-us/vclang/html/_core_obsolete_calling_conventions.asp).
The current choices are listed at
http://msdn.microsoft.com/library/en-us/vclang/html/_core_Argument_Passing_and_Naming_Conventions.asp.
Fra
I agree. We run a single realm and a flat LDAP setup. The problem with
using the Novell "context" idea is people are always moving around,
titles/departments change, students became staff or faculty etc.. It is
much easier to carry a single kerberos ID around regardless and just
change LDAP attribu
it is possible... we have several cross realm domains setup... this allows cross realm
communications and users from one domain get tickets in another. once it's setup, it's
fairly seamless
The Microsoft paper was invaluable... but you MUST follow it step by step.
AND if your NETBIOS REALM and
From my (perhaps minimal, compared to others in this group) experience,
I strongly reccommend as few realms as possible, and as "flat" a
structure as possible, especially in the academic world, to avoid
political nightmares.
I am at a medium to large size school, with ~10,000 faculty + staff,
You can set up a trust from your AD Domain(s) to your Kerberos realm,
and them use the userprincipal field of AD to map a AD user account to a
kerb princ. This allows you, effectively, to use your login info from
your krb5 realm, but get a SID and other AD info (group membership,
personal info
Slav Inger wrote:
>
> Hello,
>
> I'm successfully using pam_krb5 to authenticate to the Win2k server from
> SuSE Linux 8.2. Now I need to be able to mount a share from that
> server, but without hardcoding the password in a config file. Is there
> anything out there that can utilize the Kerbero
[EMAIL PROTECTED] (Uli Schröder) writes:
> I had another kinit in the my path. I wasn't aware of that. I thought I
> had deleted all the old stuff. Now the new kinit workes great. I can use
> kinit with my own account. No more error 52! :)
Good, I'm glad to hear it.
> As usual a new problem came
Esteemed Others,
Is it possible to use Windows2000 Active Directory service, and
benefit from the centralized user and group info, but to use
Kerberos hosted on a linux machine as the Authentication piece?
I see descriptions on the net for using Kerberos to Authenticate,
but none of them seem to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
We are in the process of converting our university network from Novell
Netware to Kerberos/OpenAFS/OpenLDAP. The network counts about 7000 users.
There are 2 geographic locations (schools), both have their own server
centers. There is a quite fast conn
"Ken Raeburn" <[EMAIL PROTECTED]> schrieb im Newsbeitrag
news:[EMAIL PROTECTED]
> ...
> > Nevertheless if I do a kinit for my my normal account it fails with
> > error code 52. No change between krb5-1.2.7 and krb5-1.3.
>
> Is it saying "KRB5 error code 52" exactly? That shouldn't be in the
> so
Folks:
The upcoming KfW 2.5 release of MIT Kerberos will include a krb524.dll
exporting two functions
krb524_init_ets
krb524_convert_creds_kdc
KfW has never in the past included a krb524.dll. Instead the KfW Extras
package has included a k524init.exe which was statically linked to the
necess
Kerberos mailing list [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos
In article <[EMAIL PROTECTED]>,
Lukas Kubin <[EMAIL PROTECTED]> wrote:
: -BEGIN PGP SIGNED MESSAGE-
: Hash: SHA1
:
: Where can I get an AFS-enabled version of Kerberos 5 client for Windows
: 98? I've found lots of universities using it but no place where to
: download it from?
: Thank you.
17 matches
Mail list logo