Hi All,
Does anyone on the list know why RHEL4 pam_krb5 does not destroy the
ticket cache on logout like RHEL5? Is this a known issue? Is there a
way other than kdestroy to get rid of the cache?
Thank you
Kerberos mailing list
Hello is it possible to set a static credential cache name? For
example force the use of krb5cc_12334.
I have a situation where there will only be one user on a box at a
time and I want to use a static credential cache name. I tried using
pam_krb5 but it is not working.
I also tried setting
wrote:
Techie techcha...@gmail.com writes:
Hello is it possible to set a static credential cache name? For
example force the use of krb5cc_12334.
This is not recommended because it's a potential security issue unless
you're using a non-world-writable directory in which to store your ticket
On Wed, Nov 10, 2010 at 3:20 PM, Russ Allbery r...@stanford.edu wrote:
Techie techcha...@gmail.com writes:
Yes I am using yours actually, it comes with Debian.
I tried this in the session and auth pam stacks.
pam_krb5.so ccache=file:/tmp/krb5cc_2345
Is this syntax incorrect?
I believe
On Wed, Nov 10, 2010 at 4:18 PM, Russ Allbery r...@stanford.edu wrote:
Techie techcha...@gmail.com writes:
Right I put this in the common-session file only now no more
common-auth. I can indeed login with pam_krb5 but it creates the ticket
cache as /tmp/krb5cc_$UID_randomstring like
On Wed, Nov 10, 2010 at 4:46 PM, Russ Allbery r...@stanford.edu wrote:
Techie techcha...@gmail.com writes:
I actually do get messages as seen below but no errors unfortunately.
Nov 10 17:32:47 debtest sshd[32058]: pam_krb5(sshd:auth): user
krb_user authenticated as krb_u...@example.com
Nov
Hi there,
I have compiled the eyrie pam_krb5 module for my RHEL boxes. I have
many boxes running RHEL, some running 32 bit, some running 64bit.
My question is this.. for all by 32bit boxes running the same version
of RHEL, can I compile or build the libraries on a single box and
deploy to like
tty=ssh ruser= rhost=rhel4test user=joe_johnson
On Thu, Jul 15, 2010 at 2:54 PM, Russ Allbery r...@stanford.edu wrote:
Techie techcha...@gmail.com writes:
I don't know of any reason why it shouldn't work with sudo, but I don't
personally use sudo and don't have any simple way to test. I'd
On Sun, Jul 18, 2010 at 7:57 PM, Russ Allbery r...@stanford.edu wrote:
Techie techcha...@gmail.com writes:
I have your pam_krb5 module working with RHEL5 but I am having issues on
RHEL4. When I replace the RHEL pam_krb5 with the eyrie module I can't
log in. It looks like the pam_krb5
Hi,
This question is actually regarding both the RHEL pam_krb5 and the
Debian or Russ's pam_krb5. What I am trying to do is to have krb5
principals login via ssh and authenticate to a local acount.
so principal joejohn...@example.com should be authenticated as local
account joe on the local box.
On Thu, Jul 15, 2010 at 12:43 PM, Douglas E. Engert deeng...@anl.gov wrote:
On 7/15/2010 2:15 PM, Techie wrote:
Hi,
This question is actually regarding both the RHEL pam_krb5 and the
Debian or Russ's pam_krb5. What I am trying to do is to have krb5
principals login via ssh and authenticate
On Thu, Jul 15, 2010 at 1:40 PM, Douglas E. Engert deeng...@anl.gov wrote:
On 7/15/2010 3:23 PM, Techie wrote:
On Thu, Jul 15, 2010 at 12:43 PM, Douglas E. Engertdeeng...@anl.gov
wrote:
On 7/15/2010 2:15 PM, Techie wrote:
Hi,
This question is actually regarding both the RHEL pam_krb5
On Thu, Jul 15, 2010 at 2:20 PM, Russ Allbery r...@stanford.edu wrote:
Techie techcha...@gmail.com writes:
I compiled Russ's pam_krb5 on Fedora and now I can use the .k5login
file to auth with joejohn...@example.com to my local joe account.
However the auth_to_local_names maps don't work
Hello,
Is there a way to propagate the Active Directory Kerberos principals
and their passwords to an MIT KDC?
I would think that it may not be that simple but have to ask.
Thank you
Kerberos mailing list Kerberos@mit.edu
is changed.
-Ross
-Original Message-
From: kerberos-boun...@mit.edu [mailto:kerberos-boun...@mit.edu] On Behalf Of
Techie
Sent: Wednesday, June 02, 2010 9:22 AM
To: kerberos@mit.edu
Subject: Any way to propagate db
Hello,
Is there a way to propagate the Active Directory Kerberos
On Wed, Jun 2, 2010 at 11:17 AM, Russ Allbery r...@stanford.edu wrote:
Simo Sorce sso...@redhat.com writes:
Wilper, Ross A rwil...@stanford.edu wrote:
That is true.. I oversimplified a bit. This would allow you to have a
KDC with equivalent principals. You would need a trust relationship and
On Mon, Mar 29, 2010 at 11:03 AM, Russ Allbery r...@stanford.edu wrote:
The krb5.conf man page seems to indicate that you can have multiple
Kerberos REALMS defined in a single krb5.conf file.
Will doing this allow authentication to multiple realms? If so, will it
try and contact each
17 matches
Mail list logo