beros mailing list Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
--
Jason T Hardy
Enterprise Operations and Systems
Office of Information Technology
University of Texas at Arlington
GnuPG Public Key: http://omega.uta.edu/~jthardy/jthardy.gpg.asc
signature.asc
Desc
change password for existing
> users (2 scripts are fine).
>
>
> Kerberos mailing list Kerberos@mit.edu
> https://mailman.mit.edu/mailman/listinfo/kerberos
--
Jason T Hardy
Enterprise Operations and Systems
Office of I
On Wed, 2004-10-06 at 12:52, Sam Hartman wrote:
> >>>>> "Jason" == Jason T Hardy <[EMAIL PROTECTED]> writes:
>
> Jason> Sam, Actually, a load balancer simplifies client deployment
> Jason> in our case (we can't utilize DNS load bala
(reserving
> the 3rd for future use if you don't want to maintain the extra HW).
>
> If you use DNS SRV records you can also add new systems without client
> config change. That's what we do.
I can't modify DNS.
> The load balancer is simply another failure po
let you spread out your KDCs to a couple of locations, if
> you don't want to risk a single point of failure.
This is precisely what I * can not * do for political reasons.
--
Jason T Hardy
Unix Systems Administrator
Office of Information T
__
> Kerberos mailing list [EMAIL PROTECTED]
> https://mailman.mit.edu/mailman/listinfo/kerberos
--
Jason T Hardy
Unix Systems Administrator
Office of Information Technology
University of Texas at Arlington
Ker
> rect?";
> > exit 0;
> > }
> >
> > # Change pw
> > my $errorcode = $kadm5->chpass_principal($krb5princ, $newpw);
> > if ($errorcode != 1) {
> > print "Something went wrong, code
> > $errorc
ord was cor
> rect?";
> exit 0;
> }
>
> # Change pw
> my $errorcode = $kadm5->chpass_principal($krb5princ, $newpw);
> if ($errorcode != 1) {
> print "Something went wrong, code
> $errorcode > ";
> exit 0;
>
Password) or die
Authen::Krb5::Admin::error;
...
I've been unable to find any useful documentation on the Internet. Has
anyone on this list had success using this module? I'd be happy to share
my code when finished.
Jason
--
Jason T Hardy
Unix Systems Administrator
Office of Info
equests at the slave KDCs. I'm not even sure
> >if this would work, but if I were to set up a NAT tunnel from the
> >kpasswd service on my slave KDC to my admin server (and back again), the
> >client would think that the slave is handling the password change
uest.
I'm sure that there are more issues that I haven't thought of or run
into yet. I'd appreciate any guidance that you may be able to provide.
Thank you,
Jason Hardy
--
Jason T Hardy
Unix Systems Administrator
Office of Information Technology
University of Texas at Arlington
h
11 matches
Mail list logo