Hi. Can anyone in the know explain in plain English what the new
--enable-maintainer-mode option in the KRB5 1.4 configure script does?
I know what it SAYS -- something about enabling rebuilding of Makefiles,
etc. -- but I still don't know what it means.
If this option is just for Kerberos sou
This is a standard automake macro.
Basically the intent is that if you pass --enable-maintainer-mode, the
generated makefiles will have rules to rebuild Makefile.in from
Makefile.am, and configure from configure.ac, so that if you change
those files they will take effect. If you don't pass
--enab
Hallo everybody,
Does anybody know which win32 function I can use to set the kerberos
password for the user? (I need an windows application to do that)
Thanks Juergen
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman
I had my FC3 Linux box authenticating just fine against my Windows AD
server using kerberos. Then I changed my password on my Windows XP
machine. A week later I logged off my Linux box and now I cannot log
back in. I've tried using the old password, the new password, even the
password for the lo
Sorry, version pasted wasn't edited properly. There were some other
errors which I fixed. I seem to have narrowed the problem down. kinit
-k is finding the AD domain controller which created the keytab. It
is, however, using the wrong principal. If I do a kinit -k
ADhost.keytab
strace on t
On Thu, 13 Jan 2005 13:07:21 -0500, FM wrote:
> In samba, I can script to update the PRINCIPAL of the users. So not prob
> to sync when changing password from windows machines.
>
> Now, if my user use kpasswd to change his password, it is not in sync
> with the samba password attributes.
>
> L
[EMAIL PROTECTED] wrote:
Sorry, version pasted wasn't edited properly. There were some other
errors which I fixed. I seem to have narrowed the problem down. kinit
-k is finding the AD domain controller which created the keytab. It
is, however, using the wrong principal. If I do a kinit -k
I am trying to fully understand the impacts and limitations of
implementing Kerberos in a large enterprise with different legacy
systems, Windows servers, Oracle databases and a wild array of Windows
apps authenticating on those Oracle DBs.
My question is twofold:
1. If there are let's say 12 dif
FYI
I managed to build the krb5-1.3.6.tar with AIX 5.2 and IBM C++ 6.0.
./configure --prefix=/opt/freeware --without-tcl --without-krb4
make
make install
make check
At least now Samba 3.0.10 will find Kerberos V5 from my system.
IBM build Kerberos V5 from AIX 5.2 Expansion pack is not complete.
Frank Balluffi wrote:
My investigation shows that Firefox on Windows (which uses Microsoft SSPI)
sends RFC 2478 SPNEGO tokens with the mutual-required flag on and Firefox
on Linux/UNIX (which uses GSSAPI) sends RFC 1964 Kerberos tokens with the
mutual-required flag off.
Can anyone think of a re
> "Jorma" == Jorma <[EMAIL PROTECTED]> writes:
Jorma> I tried to compile krb5-1.4 package with IBM C++ 6.0.
Jorma> Here is the result:
Jorma> # ./configure --prefix=/opt/freeware --without-tcl --without-krb4
Jorma> After few make runs I see better where the error is...
Jorma> # make
Jorma>
While testing 1.4 we are seeing this same error with kadmin. So far it
seems to be only a kadmin client issue and happens regardless of whether
the server is running 1.3.5, 1.3.6, or 1.4.
The 1.3.5 and 1.3.6 kadmin clients work fine. Has anyone else seen this
issue?
I hope to find time to
12 matches
Mail list logo