Displaying 4 results from an estimated 4 matches for "prinicpal".
Did you mean:
principal
2013 May 09
1
Crossrealm Kerberos problems
...authentication
the login fails (logs below).
After perusing the source code I beleive that the problem is as such:
All taking place in mech-gssapi.c
1. mech_gssapi_userok(...) calls mech_gssapi_krb5_userok
2. mech_gssapi_krb5_userok(...) calls krb5_kuserok(...) to verify that
the given Kerberos prinicpal can log in as the requested user.
3. The authentication process is running as the Dovecot user so:
3a. krb5_kuserok(...) looks for ~dovecot/.k5login to authorize cross
realm logins
3b. There is no ~dovecot/.k5login, thus no cross realm access is allowed
3c. It should be looking at the users ....
2008 Feb 08
0
samba + mit krb5 + ldap hypothetical
...valid person within a ldap directory which does contain
valid information for the posixAccount objectclass (the same information
that would normally be seen in /etc/passwd including their uid, gid,
homedir path, but doesn't contain their actual password).
c) "user123" is also a valid prinicpal within a MIT krb5 realm and "pw123"
is their krb5 realm password.
d) "user123" isn't relevant at all on the windows client side of things
(there's no AD server or centralized Windows administration) so I'm not
trying to join the samba server to a Windows AD domain o...
2005 Feb 22
1
Instiki @ O''Reilly ETech 2005
...my friend Tim Lauer and I are going to be
doing a short "high order bit" talk at the O''Reilly Emerging
Technologies conference, describing a particular use of Instiki which
we came up with:
http://conferences.oreillynet.com/cs/et2005/view/e_sess/5985
Tim is an elementary school prinicpal (at http://lewiselementary.org),
and some of his teachers are using Instiki to publish student writing.
The teachers have Instiki installed on their iBooks, and the built in
Apache server is tweaked to redirect to Instiki, to take advantage of
the built in Rendezvous support, so the students can e...
2003 Nov 04
1
Samba 3/ADC/Winbind problem
...he trust secret via RPC calls succeeded
wbinfo -m: return to prompt, no output
wbinfo -u: correct list of local + AD members
wbinfo -g: correct list of local + AD groups
kinit: succeeded
klist output for root from the samba machine:
Ticket cache: FILE:/tmp/krb5cc_0
Default prinicpal: Administrator@THIS.DOMAIN
Valid starting Expires Service_principal
11/03/03 19:00:38 11/04/03 05:00:38 krbtgt/THIS.DOMAIN@THIS.DOMAIN
Kerberos 4 ticket cache: /tmp/tkt0
klist: You have no tickets cached
pam.d/login modified and working
AD...