search for: realitivli

Displaying 5 results from an estimated 5 matches for "realitivli".

Did you mean: realitivly
2002 Oct 31
2
Re: Samba PDC and Kerberos(MIT or SEAM in Uinx, without microsoft ADS)
Hi, Andrew, Thank you very much for your answer. Now our case is as below: 1, our client machine is the windows 2000 2, We want our Kerberos run in the Unix box. 3, We also want the samba as PDC for all windows user and machine. 4, We want integrate the Kerberos Authentication with samba authentication. So in this situation, can we get the kerberos login from the windows
2002 Nov 01
0
Re: Samba PDC and Kerberos(MIT or SEAM in Uinx, without microsoft ADS)
Hi, Thank you very much for you reply. Some people think storing the sensitive information in the LDAP is not very secure.They think the sensitive information and the public information should be stored in seperate place.So we want the samba PDC authentication can integrete the Kerberos authentication directly. John ---- Original Message ---- From: Yura Pismerov Date: Thu 10/31/02 18:39
2002 Oct 29
0
Re: Samba and Kerberos PDC(MIT or SEAM, without microsoft ADS)
Hi, Andrew, Thank you very much. I have read some information about the samba PDC kerberos authentication as below. >> Anyone worked with a combination of Samba (TNG, or 2.x) running as a PDC for >> a network of primarily NT workstations, with the passwords being >> authenticated back into a Kerberos IV database? or a Kerberos V? > >> I'm trying to get this
2002 Nov 01
0
Re: Samba PDC and Kerberos(MIT or SEAM in Uinx, without microsoft ADS)
A few more questions and comments... related to this topic If Kerberos is the back-end to LDAP.. there is no need to synchronize or store a password in the LDAP tree.. just the principal for the user in the userpassword attribute: userpassword = {kerberos}name@domain in the smb.conf file do I need stuff like this? Unix password sync = yes passwd program =
2002 Nov 01
0
Re: Samba PDC and Kerberos(MIT or SEAM in Uinx,without microsoft ADS)
Jonathan Higgins wrote: > > A few more questions and comments... related to this topic > > If Kerberos is the back-end to LDAP.. there is no need to synchronize or store a >password in the LDAP tree.. just the principal for the user in the userpassword >attribute: userpassword = {kerberos}name@domain That is correct. I did not mean sync between Kerberos and LDAP, I mean sync