Displaying 7 results from an estimated 7 matches for "keybased".
2013 Nov 28
4
SSH - Winbind and Keybased Auth
Hi Team,
We have a weird issue that we are trying to understand. We have winbind set up and working successfully for user authentication with passwords via ssh. We have pam.d/system-auth-ac and password-auth-ac (symlinked) set to require membership of a group which works great via password authentication.
However, if the user has a ssh key set up, they seem to bypass the group membership
2023 Nov 04
0
Can't see custom attribute in attribute editor
Samba 4.17.9, I've already edited the schema to create an attribute and add it to the user class. I also added an already existing attribute to the user class, both are seen in the attribute editor.
I created a third one, I think I did everything suggested in the wiki and I'm able to query and modify the 3rd attribute using LDAP. Is there a step after creating an attribute and modifying
2015 Mar 27
2
No connect to/from other machines on remote ethernet
Hi all,
I have finally got tinc working, but it?s only between server/client. Client can receive broadcast packets from server ethernet, and pings between them is fine.
If I ping tinc client(192.168.88.166) from any machine in my server lan, 192.168.88.0/24, all packets timed out, and nothing received by the client. Any ideas? Thanks!
Regards,
Quan Zhou
+------------------------+
|pub
2015 Mar 27
0
Unable to get IP address from DHCP on remote end.
Hi all,
I followed the guide "simple-bridging-with-dhcp", which has two parts:
http://www.tinc-vpn.org/examples/simple-bridging-with-dhcp-server-side/
http://www.tinc-vpn.org/examples/simple-bridging-with-dhcp-client-side/
I have altered two things to fit my needs, 1) DHCP server(host:pek1) is on client side ethernet, so I have bridged eth0 and tun1 together; 2) Network/Server/Client
2020 Jan 30
3
SSH certificates - restricting to host groups
On 30/01/2020 12:53, Michael Str?der wrote:
> On 1/30/20 1:27 PM, Brian Candler wrote:
>> I am trying to work out the best way to issue SSH certificates in such
>> way that they only allow access to specific usernames*and* only to
>> specific groups of host.
> I also thought about this for a while. The only idea I came up with is
> to have separate CAs used as trust
2005 Oct 23
4
rsync with ssh
I'm new on rsync, and I have some question regarding file synchronization
my rsyncd.conf is
secrets file = /etc/rsyncd.secrets
read only = yes
list = yes
uid = nobody
gid = nobody
max connections = 1
log file = /var/log/rsyncd.log
pid file = /var/run/rsyncd.pid
lock file = /var/run/rsync.lock
[test]
path = /home/test
auth users = test
on another linux, I executed
rsync --verbose --progress
2006 Mar 14
8
PXE boot, Kickstart NFS install and %include...
...clude /opt/kickstart/include/bacula.cfg
# Install "standard" additional components
yum -y install keychain bash-completion multitail webmin
And a sample of one of the modular configs...
[root at archive kickstart]# cat include/secure-sshd.cfg
# Lock down sshd_config to only accept SSH2 keybased auth
mkdir -p /etc/ssh/RCS
ci -t-"Main SSHD configuration file." -u /etc/ssh/sshd_config
co -l /etc/ssh/sshd_config
cat <<EOF > /etc/ssh/sshd_config
#
# Main SSHD configuration file.
#
# \$Id\$
#
# FILE UNDER RCS, DO NOT EDIT WITHOUT CHECKING OUT!!!
Port 22
Protocol 2
HostKey /e...