Hello,
I've read about this topic in mailing list but I didn't found the solution.
I want validate LDAP users against Apache using the certificates than the
user store in LDAP.
I mean, I create and store the X509 certificates in LDAP. Afterwards I send
to my clients the certificate and they
On Fri, Aug 5, 2011 at 4:56 AM, Martin Sanchez marsa...@gmail.com wrote:
Hello,
I've read about this topic in mailing list but I didn't found the solution.
I want validate LDAP users against Apache using the certificates than the
user store in LDAP.
I mean, I create and store the X509
On Fri, Aug 5, 2011 at 1:56 AM, Martin Sanchez marsa...@gmail.com wrote:
Hello,
I've read about this topic in mailing list but I didn't found the solution.
I want validate LDAP users against Apache using the certificates than the
user store in LDAP.
I mean, I create and store the X509
I've asked earlier about this (but using MySQL):
Does anyone have a working solution for Apache Digest password
management using PostgreSQL (and mod_dbd)?
If so, would you be willing to share setup details?
Best regards,
-Tom
USAFA, CS-24, Class of 1965
Niceville, Florida, USA
I'm having a perplexing failure authenticating users against LDAP on
one server. I have a second server that has the same Apache
configuration, authenticates against the same LDAP server with the
same bind account, and succeeds.
[Fri Aug 05 17:46:23 2011] [info] Server: Apache/2.2.3, Interface:
The below packet logs show that when the Apache server attempts to
bind to LDAPS, it successfully establishes the TCP connection to port
636 (syn, syn-ack, ack) and then immediately tears down the connection
(fin-ack, ack, fin-ack, ack). This cycle repeats 7 times in extremely
quick