Clément Oudot,
Thank you.
I have changed the rootdn from root to other user, it’s still not working. I
can modified the user password same with before.
I have set the password policy and added user in this password policy as below:
发件人: openldap-technical [mailto:openldap
Yes, I have set a default password policy and assigned the password policy to
user.
-邮件原件-
发件人: openldap-technical [mailto:openldap-technical-boun...@openldap.org] 代表
Ulrich Windl
发送时间: 2019年2月14日 22:18
收件人: matthieu.ce...@nbs-system.com; openldap-technical@openldap.org; tianzy1225
主题:
Am Wed, 13 Feb 2019 14:41:07 +
schrieb :
> Hello together. I am the heir of a setup based on RHEL 6.10 and
> Openldap 2.4.45 (ltb) A master syncrepls to a slave in
> type=refreshOnly using bindmethod=sasl, saslmech=external.
>
> The mapped techuser resides in ou=ServiceUser. All Clients also
>>> "Tian Zhiying" schrieb am 14.02.2019 um 12:17
in
Nachricht <01d4c456$d6b4ed40$841ec7c0$@thundersoft.com>:
> Hi Matthieu,
>
>
>
> Thank you for your reply.
>
>
>
> I have set the "pwdInHistory" attribute to 5 in password policy and set
> forbidden their reuse in config.inc.php of S
>>> "Tian Zhiying" schrieb am 14.02.2019 um 07:58
>>> in
Nachricht <012201d4c432$c27c4540$4774cfc0$@thundersoft.com>:
> Hi
>
> Is there a feature that OpenLDAP password policy can forbidden user password
> reuse of the last 5 password?
>
> Thanks.
"Password policy" is the name you are lookin
On 2/14/19 8:19 AM, Derek Zhou wrote:
> Tian Zhiying writes:
>> Is there a feature that OpenLDAP password policy can forbidden user
>> password reuse of the last 5 password?>
> Better use kerberos for advanced password policy requirements. You can
> use SASL to bridge LDAP's userPassword checking t
--On Wednesday, February 13, 2019 2:41 PM + thomas.mel...@t-systems.com
wrote:
Hello together. I am the heir of a setup based on RHEL 6.10 and Openldap
2.4.45 (ltb) A master syncrepls to a slave in type=refreshOnly using
bindmethod=sasl, saslmech=external.
Use refreshAndPersist, use delta
Le 14/02/2019 à 12:17, Tian Zhiying a écrit :
>
> But it seems not working, my password is following:
>
> First time password: AAbb1122
>
> Second time password: CCdd3344
>
> *Third time password: AAbb1122, same with the first time password, it
> has been modified successfully.*
>
Check that the
Tian Zhiying writes:
> Hi
>
> Is there a feature that OpenLDAP password policy can forbidden user password
> reuse of the last 5 password?
>
Better use kerberos for advanced password policy requirements. You can
use SASL to bridge LDAP's userPassword checking to a kerberos backend so
everythin
Hi Quanah,
Yes, indeed. I've used the ./mdb_copy -v to get the copy
of the database. It has created 227MB file, which I've copied over to the ldap
data folder and replaced the original 80GB file.
Cheers
- Original Message -
> From: "Quanah Gibson-Mount"
> To: "Andrei Mikhailovsky" ,
Hi Howard,
Many thanks for your suggestions. I am about to try what you've suggested
(download and compile the latest master version of lmdb from git using master
branch of https://github.com/LMDB/lmdb).
However, just to note, I am running the latest version of zimbra which uses
pretty recen
Hi Matthieu,
Thank you for your reply.
I have set the "pwdInHistory" attribute to 5 in password policy and set
forbidden their reuse in config.inc.php of Self Service Password. As below
shown:
But it seems not working, my password is following:
First time password: AAbb1122
S
You may set the "pwdInHistory" attribute to 5 to store the last 5
passwords used, and forbid their reuse.
Le 14/02/2019 à 10:35, Matthieu Cerda a écrit :
> Yes, you might want to use the password policy (ppolicy) overlay:
> https://kb.symas.com/v2.4.45.2/man5/slapo-ppolicy/
>
> Le 14/02/2019 à 07:
Yes, you might want to use the password policy (ppolicy) overlay:
https://kb.symas.com/v2.4.45.2/man5/slapo-ppolicy/
Le 14/02/2019 à 07:58, Tian Zhiying a écrit :
> Hi
>
> Is there a feature that OpenLDAP password policy can forbidden user password
> reuse of the last 5 password?
>
> Thanks.
>
>
14 matches
Mail list logo