-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Sam Hartman wrote:
|>"Matt" == Matt Joyce <[EMAIL PROTECTED]> writes:
|
|
|
| Matt> 3. Hope samba 3 has functionality to handle kerberos ticket
| Matt> grabbing so it can authenticate to ldap via gssapi for each
| Matt> person.
|
| The
> "Matt" == Matt Joyce <[EMAIL PROTECTED]> writes:
Matt> 3. Hope samba 3 has functionality to handle kerberos ticket
Matt> grabbing so it can authenticate to ldap via gssapi for each
Matt> person.
The samba client certainly supports Kerberos both for CIFS and LDAP
operations.
_
Kermit 95 supports Telnet and Rlogin using KFW 2.6.5.
There are several other clients that do so as well.
Jeffrey Altman
Bernard E. Wood wrote:
> Is there a kerberized telnet or rlogin application that works with KfW
> 2.6.5?
> I've been using the Cygnus version, which is OK, but I like MIT's
I really dunno where this question should be directed, I've tried the
LDAP and Samba mailing lists to no avail...
I want to get samba 3 to authenticate via ldap... but ldap is kerberized.
we have a few ideas...
1. Keep a Samba Only Password / User account field in ldap... and use
that to grab
Hi,
I am testing a setup with cross realm authentication. I know that
there are several documents describing this setup, but none of them
work for me. I followed the instructions of MS Interoperatebility
guide, and the guidelines in O'Reilly's Definite Guide to Kerberos.
I am using MS Server 2003
Is there a kerberized telnet or rlogin application that works with KfW
2.6.5?
I've been using the Cygnus version, which is OK, but I like MIT's flavor
much better except for the lack of telnet / rlogin.
Kerberos mailing list [EMAIL PROT
On Tue, 2004-10-19 at 22:44, Marcus O. White wrote:
> G'day All,
>
> I've attempting to get kerberos installed and configured on a RHEL 3.0
> server. Originally RHEL came with kerberos 1.2.7. I located and
> installed from rpm the 1.3.4 version of kerberos. I had it working at
> one point then dec
Hi Derek,
I have a few questions, and then I can generate a new keytab for your
afs/umd.umich.edu principal. You will then need to run the asetkey program
to copy the key out of the keytab and into your KeyFile. You'll need a copy
of the asetkey program, hence the questions:
1) What OS platform
Jeffrey Altman wrote:
Make sure that the only key type you have for the trust
in the MIT KDC for your cross realm principals are DES-CBC-MD5
and RC4-HMAC. (RC4-HMAC requires 2003 SP1 beta).
BarBaar wrote:
Hi,
I am testing a setup with cross realm authentication. I know that
there are several doc
Make sure that the only key type you have for the trust
in the MIT KDC for your cross realm principals are DES-CBC-MD5
and RC4-HMAC. (RC4-HMAC requires 2003 SP1 beta).
BarBaar wrote:
> Hi,
>
> I am testing a setup with cross realm authentication. I know that
> there are several documents descri
10 matches
Mail list logo