This is most likely neither an OpenLDAP issue, nor a Kerberos issue. Be
sure you have properly configured saslauthd.
--On Thursday, February 09, 2006 9:31 AM -0500 Karen R McArthur
<[EMAIL PROTECTED]> wrote:
> This issue involves ldap-kerberos integration. I'm not sure if this is
> a kerberos
Actually, I lied. I did create a new service/checkpw principal and gave
it the pw change service flag and that's what I'm using to check the
password. I should probably verify that ticket with a keytab.
On Thu, 2005-09-22 at 13:54 -0400, Tom Yu wrote:
> >>>>> &
Ah, that work. I tried to get a ticket for kadmin/changepw instead of a
TGT for the realm. Thanks for the lead!
-- DK
On Thu, 2005-09-22 at 10:09 -0700, Mike Friedman wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Thu, 22 Sep 2005 at 11:36 (-0500), Digant C Ka
Hello folks,
I'm trying to find a way to authenticate a username and password pair
regardless of whether the password is expired or not. When using
Authen::Krb5, if an accounts pw is expired, regardless of the password I
use to try to get a ticket, it will give me the error that the password
is e
> >>$handle =
> >>Authen::Krb5::Admin->init_with_password("$ADMINPRINC","$adminpass");
> >>$kp=Authen::krb5::get_default_realm();
> >>print $kp;
> >>
> >>but I received :
> >>Undefined subroutine &Authen::krb5::get_defa
> My question is twofold:
>
> 1. If there are let's say 12 different Windows apps accessing Oracle,
> do all these apps need to be "Kerberized" or does the fact that Oracle
> by itelf can be Kerberized is sufficient ?
If you are using Oracle Forms, for instance, and something on the Oracle
serve
I figured it out with the help of the author of Authen::Krb5::Admin.
policy_clear() doesnt' return a value so the or die
statement was killing it. Removing that statement fixed it.
On Thu, 2004-12-16 at 13:13, Digant C Kasundra wrote:
> Does anyone have a code snippet on how to use
Does anyone have a code snippet on how to use Perl to clear someone's
policy? I'm using Authen::Krb5::Admin and I'm trying the following to
no avail:
my $krb5_princ = Authen::Krb5::parse_name( $principal )
or
dienice( $eventid, $ERROR_TAG,
"kadmin_reset_password:
Hello list,
I've been unable to get the minimum password life feature to work. I
set the default policy to make the minimum password life equal to 300,
yet I can change passwords over and over again immediately. What am I
doing wrong?
-- DK
Kerb
Hello list,
Does anyone know how many incoming connections/active connections
kadmind can handle? I'm stress testing password changes and if I hit
the kadmind server with more than 20 simultaneous password changes, I
get "kadmin: GSS-API (or Kerberos) error while initializing kadmin
interface" er
10 matches
Mail list logo