Displaying 20 results from an estimated 23 matches for "acl_fil".
Did you mean:
acl_file
2019 Mar 10
3
sieve vacation to an alias group
...ns la
base de donn?es." >&2
??????? return 1
??? fi
??? return 0
}
function set_acl {
??? l_maildir=$1
??? l_email=$2
??? echo "giving $l_email access to $l_maildir"
??? if [ ! -d $l_maildir ]
??? then
??????? #.Sent isn't there yet.
??????? return
??? fi
??? acl_file="$l_maildir/dovecot-acl"
??? echo "echo user=$l_email lr >> $acl_file"
??? echo user="$l_email" lr >> "$acl_file"
??? chown vmail:vmail "$acl_file"
}
if [ "$#" -lt 2 ]
then
??? echo "usage : $0 partage at domain.com...
2019 Mar 10
2
sieve vacation to an alias group
...t;
> function set_acl {
> ??? l_maildir=$1
> ??? l_email=$2
> ??? echo "giving $l_email access to $l_maildir"
> ??? if [ ! -d $l_maildir ]
> ??? then
> ??????? #.Sent isn't there yet.
> ??????? return
> ??? fi
> ??? acl_file="$l_maildir/dovecot-acl"
> ??? echo "echo user=$l_email lr >> $acl_file"
> ??? echo user="$l_email" lr >> "$acl_file"
> ??? chown vmail:vmail "$acl_file"
> }
>
>
> if [ "$#" -lt 2 ]
>...
2019 Mar 10
0
sieve vacation to an alias group
...> fi
> return 0
> }
>
> function set_acl {
> l_maildir=$1
> l_email=$2
> echo "giving $l_email access to $l_maildir"
> if [ ! -d $l_maildir ]
> then
> #.Sent isn't there yet.
> return
> fi
> acl_file="$l_maildir/dovecot-acl"
> echo "echo user=$l_email lr >> $acl_file"
> echo user="$l_email" lr >> "$acl_file"
> chown vmail:vmail "$acl_file"
> }
>
>
> if [ "$#" -lt 2 ]
> then
> echo...
2019 Mar 10
0
sieve vacation to an alias group
...gt; ??? l_maildir=$1
>> ??? l_email=$2
>> ??? echo "giving $l_email access to $l_maildir"
>> ??? if [ ! -d $l_maildir ]
>> ??? then
>> ??????? #.Sent isn't there yet.
>> ??????? return
>> ??? fi
>> ??? acl_file="$l_maildir/dovecot-acl"
>> ??? echo "echo user=$l_email lr >> $acl_file"
>> ??? echo user="$l_email" lr >> "$acl_file"
>> ??? chown vmail:vmail "$acl_file"
>> }
>>
>>
>> if...
2019 Mar 10
2
sieve vacation to an alias group
...t;
>> function set_acl {
>> l_maildir=$1
>> l_email=$2
>> echo "giving $l_email access to $l_maildir"
>> if [ ! -d $l_maildir ]
>> then
>> #.Sent isn't there yet.
>> return
>> fi
>> acl_file="$l_maildir/dovecot-acl"
>> echo "echo user=$l_email lr >> $acl_file"
>> echo user="$l_email" lr >> "$acl_file"
>> chown vmail:vmail "$acl_file"
>> }
>>
>>
>> if [ "$#" -lt...
2019 Mar 09
4
sieve vacation to an alias group
Hi,
We have an alias group named xyz at example.com, this alias group has 3 actual
users a at example.com, b at example.com and c at example.com
We set vacation rule on the generic sieve rule, the problem is that 3
responses are sent to the original sender. (obviously because the rule is
being executed with each user in the alias group)
Is it possible to set auto response only once, we tried
2005 Jan 12
1
URGENT winbind - New DOMAIN but old DOMAIN not CHANGING - Resent
...cl
*/administartor@ADMIN.SJC *
Does this ticket look ok? the krbtgt record looks a little odd to me.
I figure I should get ADMIN/chris, and I cannot see any entries for
STAFF realm left over.
I kdestroyed the ticket and recreated it, but no luck
kdc.conf
[kdcdefaults]
kdc_ports = 88
acl_file = /etc/kerberos/krb5kdc/kadm5.acl
dict_file = /usr/share/dict/words
admin_keytab = /etc/kerberos/krb5kdc/kadm5.keytab
[realms]
ADMIN.SJC = {
master_key_type = des3-cbc-sha1
supported_enctypes = des3-cbc-sha1:normal des-cbc-crc:normal
des-cbc-crc:v4 des-cbc-crc:afs3
profile = /etc/k...
2005 Oct 26
2
ADS + Samba
...les dns wins
networks: files dns
protocols: db files
services: db files
ethers: db files
rpc: db files
kdc.conf
[kdcdefaults]
kdc_ports = 88,750
[realms]
EXAMPLE.COM = {
database_name = /etc/krb5kdc/principal
admin_keytab = /etc/krb5kdc/kadm5.keytab
acl_file = /etc/krb5kdc/kadm5.acl
dict_file = /etc/krb5kdc/kadm5.dict
key_stash_file = /etc/krb5kdc/.k5.EXAMPLE.COM
kadmind_port = 749
max_life = 10h 0m 0s
max_renewable_life = 7d 0h 0m 0s
master_key_type = des3-hmac-sha1
supported_enctypes = des3-hma...
2005 Jan 12
0
winbind - New DOMAIN but old DOMAIN not CHANGING .URGENT
...acl
*/administartor@ADMIN.SJC *
Does this ticket look ok? the krbtgt record looks a little odd to me.
I figure I should get ADMIN/chris, and I cannot see any entries for
STAFF realm left over.
I kdestroyed the ticket and recreated it, but no luck
kdc.conf
[kdcdefaults]
kdc_ports = 88
acl_file = /etc/kerberos/krb5kdc/kadm5.acl
dict_file = /usr/share/dict/words
admin_keytab = /etc/kerberos/krb5kdc/kadm5.keytab
[realms]
ADMIN.SJC = {
master_key_type = des3-cbc-sha1
supported_enctypes = des3-cbc-sha1:normal des-cbc-crc:normal
des-cbc-crc:v4 des-cbc-crc:afs3
profile = /etc/krb5.c...
2008 Nov 23
1
v1.2.alpha4 released
...ict. If you don't expect many shared
mailboxes, a file backend is the easiest, but you could also use SQL or
Berkeley DB. With a file backend you could also create per-domain files,
which will improve performance if you don't need cross-domain shared
mailboxes. You could do this with e.g.:
acl_file = /home/virtual/%d/shared-mailboxes
Also full text searching works now better with virtual mailboxes.
Previously the fts would have duplicated the indexes for virtual
mailboxes. Now with Solr backend it searches the original mailboxes
directly. Although this is still missing some optimizations an...
2015 Feb 13
2
Question re kerberos . . .
...mba/sysvol
read only = No
Here's my 'kdc.conf'
adam at sogo:~$ sudo cat /etc/krb5kdc/kdc.conf
[kdcdefaults]
kdc_ports = 750,88
[realms]
SMBDOMAIN.COM = {
database_name = /var/lib/krb5kdc/principal
admin_keytab = FILE:/etc/krb5kdc/kadm5.keytab
acl_file = /etc/krb5kdc/kadm5.acl
key_stash_file = /etc/krb5kdc/stash
kdc_ports = 750,88
max_life = 10h 0m 0s
max_renewable_life = 7d 0h 0m 0s
master_key_type = des3-hmac-sha1
supported_enctypes = aes256-cts:normal arcfour-hmac:normal
des3-hmac-sha1:no...
2013 Sep 24
2
delete kerberos databases and start over
...in_server = thisbox.domain.suffix:749
default_domain = domain.suffix
}
kdc.conf is:
[kdcdefaults]
kdc_ports 750,88
[realms]
domain.suffix = {
database_name = /usr/local/samba/private/principal
admin_keytab = FILE:/usr/local/samba/private/.keytab
acl_file = /etc/krb5kdc/kadm5.acl
keys_stash_file = /etc/krb5kdc/stash
kdc_ports = 750,88
max_life = 9107d 5h 0m 0s
max_renewable_life = 9300d 0h 0m 0s
master_key_type = des3-hmac-sha1
supported_enctypes = aes256-cts:normal arcfour-hmac:normal
des3-hma...
2009 Mar 13
1
[ADS]Trust relationship 'expires'
...- - - - - - - - - - - - - - - - - - - - - -
-
kdc.conf
[kdcdefaults]
kdc_ports = 88,750
[reamls]
MYDOMAIN.COM = {
profile = /etc/krb5/krb5.conf
database_name = /var/krb5/principal
admin_keytab = /etc/krb5/kadm5.keytab
acl_file = /etc/krb5/kadm5.acl
kadmind_port = 749
max_life = 8h 0m 0s
max_renewable_life = 7d 0h 0m 0s
default_principal_flags = +preauth
}
2003 Nov 19
1
Samba 3.0 client connection error
...ems, Inc. All rights reserved.
# Use is subject to license terms.
#
#ident "@(#)kdc.conf 1.2 02/02/14 SMI"
[kdcdefaults]
kdc_ports = 88,750
[realms]
___default_realm___ = {
profile = /etc/krb5/krb5.conf
database_name = /var/krb5/principal
admin_keytab = /etc/krb5/kadm5.keytab
acl_file = /etc/krb5/kadm5.acl
kadmind_port = 749
max_life = 8h 0m 0s
max_renewable_life = 7d 0h 0m 0s
default_principal_flags = +preauth
}
#
#pragma ident "@(#)krb5.conf 1.2 99/07/20 SMI"
# Copyright (c) 1999, by Sun Microsystems, Inc.
# All rights reserved.
#
# krb5.conf template
#...
2014 Aug 26
2
Failed to join domain: failed to join domain 'XXX.YYY' over rpc: Access denied
...= dcserver.xxx.yyy:88
admin_server = dcserver.xxx.yyy:749
}
[domain_realm]
.xxx.yyy = XXX.YYY
xxx.yyy = XXX.YYY
/var/kerberos/krb5kdc/kdc.conf :
--------------------------------
[kdcdefaults]
kdc_ports = 88
kdc_tcp_ports = 88
[realms]
XXX.YYY= {
#master_key_type = aes256-cts
acl_file = /var/kerberos/krb5kdc/kadm5.acl
dict_file = /usr/share/dict/words
admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
supported_enctypes = aes256-cts:normal aes128-cts:normal
des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal
des-cbc-md5:normal des-cbc-crc:normal
}
Then :...
2004 Jul 29
2
2003 KDC and Samba
...C.DS.AF.MIL
usaf.af.mil = USAF.AFMC.DS.AF.MIL
[kdc]
profile = /var/kerberos/krb5kdc/kdc.conf
[appdefaults]
pam = {
debug = false
ticket_lifetime = 36000
renew_lifetime = 36000
forwardable = true
krb4_convert = false
*****************************
kdc.conf
*********
[kdcdefaults]
acl_file = /var/kerberos/krb5kdc/kadm5.acl
dict_file = /usr/share/dict/words
admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
v4_mode = nopreauth
[realms]
USAF.AFMC.DS.AF.MIL = {
master_key_type = des-cbc-crc
supported_enctypes = des3-cbc-sha1:normal des3-cbc-sha1:norealm
des3-cbc-sha1:onlyrealm...
2014 Aug 26
0
Fwd: Re: Failed to join domain: failed to join domain 'XXX.YYY' over rpc: Access denied
...t; xxx.yyy = XXX.YYY
>>
>> /var/kerberos/krb5kdc/kdc.conf :
>> --------------------------------
>> [kdcdefaults]
>> kdc_ports = 88
>> kdc_tcp_ports = 88
>>
>> [realms]
>> XXX.YYY= {
>> #master_key_type = aes256-cts
>> acl_file = /var/kerberos/krb5kdc/kadm5.acl
>> dict_file = /usr/share/dict/words
>> admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
>> supported_enctypes = aes256-cts:normal aes128-cts:normal
>> des3-hmac-sha1:normal arcfour-hmac:normal des-hmac-sha1:normal
>> des-cb...
2010 Nov 22
1
"list" ACL privilege ignored for LSUB command?
...d and that's why the dovecot-acl-list files exist.
Anyway, am I right in my observations, or am I completely overlooking
something obvious?
Thanks!
Willie
[1] http://tools.ietf.org/html/rfc4314#section-2.1
Dovecot's wiki also indicates support for this in
http://wiki1.dovecot.org/ACL#ACL_files
I'm using version 1.2.9 with the acl and imap_acl mail_plugins in case
that matters.
2015 Feb 13
0
Question re kerberos . . .
...b5kdc/kdc.conf
>>> [kdcdefaults]
>>> kdc_ports = 750,88
>>>
>>> [realms]
>>> SMBDOMAIN.COM = {
>>> database_name = /var/lib/krb5kdc/principal
>>> admin_keytab = FILE:/etc/krb5kdc/kadm5.keytab
>>> acl_file = /etc/krb5kdc/kadm5.acl
>>> key_stash_file = /etc/krb5kdc/stash
>>> kdc_ports = 750,88
>>> max_life = 10h 0m 0s
>>> max_renewable_life = 7d 0h 0m 0s
>>> master_key_type = des3-hmac-sha1
>>> suppo...
2006 Jun 20
0
Unable to join AD
...our.domain.com = OUR.DOMAIN.COM
[kdc]
profile = /var/kerberos/krb5kdc/kdc.conf
[appdefaults]
pam = {
debug = false
ticket_lifetime = 36000
renew_lifetime = 36000
forwardable = true
krb4_convert = false
}
[root@desarrollo ~]# cat /var/kerberos/krb5kdc/kdc.conf
[kdcdefaults]
acl_file = /var/kerberos/krb5kdc/kadm5.acl
dict_file = /usr/share/dict/words
admin_keytab = /var/kerberos/krb5kdc/kadm5.keytab
v4_mode = nopreauth
[realms]
OUR.DOMAIN.COM = {
master_key_type = des-cbc-crc
supported_enctypes = des3-hmac-sha1:normal arcfour-hmac:normal
des-hmac-sha1:normal des-cbc-m...