Displaying 8 results from an estimated 8 matches for "maxssf".
2004 Dec 06
3
ADS Authentication
I'm about ready to smash my head through a wall...I could use a few answers.
1. When using security = ads, and completing net ads join, it was my
understanding that samba authenticated username/pword against ads, and
local posix accounts were nolonger needed, is this true?
2. If yes, I have not been able to get it to work. If I have a posix
user account with the same name as one in
2008 Sep 27
2
Graphical net install
Is it at all possible to do a graphical netinstall ?
I am using centos 5.2, and i have been doing net installs (pxe) for a
while in console mode...
--
Test <test at remedial-teacher.nl>
2015 Dec 04
3
How to set unix properties from command line
Samba version: 4.1.17
I want to use a Samba AD controller to manage access to both my Windows and
Linux boxes. I managed to import my old Samba users using pdbedit however
as I want to use the new Samba AD controller to manage access to the Linux
workstations too I want to configure Unix properties on all my accounts.
Unfortunately I cannot find any command-line tool on Linux that will allow
me
2005 Apr 21
0
Problem with groups & joining domain.- LDAP
...rovided
#tls_randfile /var/run/egd-pool
# SSL cipher suite
# See man ciphers for syntax
tls_ciphers HIGH:MEDIUM:SSLv2
# Client certificate and key
# Use these, if your server requires client authentication.
#tls_cert
#tls_key
# Disable SASL security layers. This is needed for AD.
#sasl_secprops maxssf=0
# Override the default Kerberos ticket cache location.
#krb5_ccname FILE:/etc/.ldapcache
# SASL mechanism for PAM authentication - use is experimental
# at present and does not support password policy control
#pam_sasl_mech DIGEST-MD5
(END)
2009 Mar 04
0
Can anyone comment on my setup?
...dom is not provided
#tls_randfile /var/run/egd-pool
# SSL cipher suite
# See man ciphers for syntax
#tls_ciphers TLSv1
# Client certificate and key
# Use these, if your server requires client authentication.
#tls_cert
#tls_key
# Disable SASL security layers. This is needed for AD.
#sasl_secprops maxssf=0
# Override the default Kerberos ticket cache location.
#krb5_ccname FILE:/etc/.ldapcache
# SASL mechanism for PAM authentication - use is experimental
# at present and does not support password policy control
#pam_sasl_mech DIGEST-MD5
uri ldap://centserver.abc.com:389/
ssl no
tls_cacertdir /etc...
2005 May 05
2
Fwd: Follow Up - Problem with groups & joining domain.- LDAP
...provided
#tls_randfile /var/run/egd-pool
# SSL cipher suite
# See man ciphers for syntax
tls_ciphers HIGH:MEDIUM:SSLv2
# Client certificate and key
# Use these, if your server requires client authentication.
#tls_cert
#tls_key
# Disable SASL security layers. This is needed for AD.
#sasl_secprops maxssf=0
# Override the default Kerberos ticket cache location.
#krb5_ccname FILE:/etc/.ldapcache
# SASL mechanism for PAM authentication - use is experimental
# at present and does not support password policy control
#pam_sasl_mech DIGEST-MD5
(END)
2011 Feb 04
0
PAM authentication with winbind and AD
...,dc=com
ldap_version 3
URI ldap://gnv-dc3-tmp.example.com
binddn cn=username,cn=GNV,cn=AllUsers,dc=example,dc=com
bindpw p at 55w0rd
scope sub
pam_login_attribute sAMAccountName
pam_passwd md5
idle_timeout 3600
nss_base_passwd dc=example,dc=com?one
nss_base_group dc=example,dc=com?one
sasl_secprops maxssf=0
krb5_ccname FILE:/tmp/krb5cc_0
/etc/pam.d/login
auth sufficient pam_winbind.so
auth sufficient pam_self.so no_warn
auth include system
# account
account sufficient pam_winbind.so
account requisite pam_secu...
2005 Jun 22
2
Problem Connecting from Windows to Samba-OpenLDAP PDC
...dom is not provided
#tls_randfile /var/run/egd-pool
# SSL cipher suite
# See man ciphers for syntax
#tls_ciphers TLSv1
# Client certificate and key
# Use these, if your server requires client authentication.
#tls_cert
#tls_key
# Disable SASL security layers. This is needed for AD.
#sasl_secprops maxssf=0
# Override the default Kerberos ticket cache location.
#krb5_ccname FILE:/etc/.ldapcache
# SASL mechanism for PAM authentication - use is experimental
# at present and does not support password policy control
#pam_sasl_mech DIGEST-MD5
ssl no
#tls_cacertdir /etc/openldap/cacerts
pam_password md5...