search for: sasl_secprop

Displaying 8 results from an estimated 8 matches for "sasl_secprop".

Did you mean: sasl_secprops
2004 Dec 06
3
ADS Authentication
I'm about ready to smash my head through a wall...I could use a few answers. 1. When using security = ads, and completing net ads join, it was my understanding that samba authenticated username/pword against ads, and local posix accounts were nolonger needed, is this true? 2. If yes, I have not been able to get it to work. If I have a posix user account with the same name as one in
2008 Sep 27
2
Graphical net install
Is it at all possible to do a graphical netinstall ? I am using centos 5.2, and i have been doing net installs (pxe) for a while in console mode... -- Test <test at remedial-teacher.nl>
2019 Apr 12
3
Sudo rules in samba with winbind
Hello All, I am currently changing my samba linux clients (Debian) from sssd binding to winbind. With sssd I had all sudo rules within the samba active directory. The configuration was based on: https://lists.samba.org/archive/samba/2016-April/199402.html Is there some guideline like the one mentioned available/has someone already experience with this for winbind based clients? Within the
2005 Apr 21
0
Problem with groups & joining domain.- LDAP
...andom is not provided #tls_randfile /var/run/egd-pool # SSL cipher suite # See man ciphers for syntax tls_ciphers HIGH:MEDIUM:SSLv2 # Client certificate and key # Use these, if your server requires client authentication. #tls_cert #tls_key # Disable SASL security layers. This is needed for AD. #sasl_secprops maxssf=0 # Override the default Kerberos ticket cache location. #krb5_ccname FILE:/etc/.ldapcache # SASL mechanism for PAM authentication - use is experimental # at present and does not support password policy control #pam_sasl_mech DIGEST-MD5 (END)
2009 Mar 04
0
Can anyone comment on my setup?
...G if /dev/urandom is not provided #tls_randfile /var/run/egd-pool # SSL cipher suite # See man ciphers for syntax #tls_ciphers TLSv1 # Client certificate and key # Use these, if your server requires client authentication. #tls_cert #tls_key # Disable SASL security layers. This is needed for AD. #sasl_secprops maxssf=0 # Override the default Kerberos ticket cache location. #krb5_ccname FILE:/etc/.ldapcache # SASL mechanism for PAM authentication - use is experimental # at present and does not support password policy control #pam_sasl_mech DIGEST-MD5 uri ldap://centserver.abc.com:389/ ssl no tls_cacert...
2005 May 05
2
Fwd: Follow Up - Problem with groups & joining domain.- LDAP
...random is not provided #tls_randfile /var/run/egd-pool # SSL cipher suite # See man ciphers for syntax tls_ciphers HIGH:MEDIUM:SSLv2 # Client certificate and key # Use these, if your server requires client authentication. #tls_cert #tls_key # Disable SASL security layers. This is needed for AD. #sasl_secprops maxssf=0 # Override the default Kerberos ticket cache location. #krb5_ccname FILE:/etc/.ldapcache # SASL mechanism for PAM authentication - use is experimental # at present and does not support password policy control #pam_sasl_mech DIGEST-MD5 (END)
2011 Feb 04
0
PAM authentication with winbind and AD
...ase dc=example,dc=com ldap_version 3 URI ldap://gnv-dc3-tmp.example.com binddn cn=username,cn=GNV,cn=AllUsers,dc=example,dc=com bindpw p at 55w0rd scope sub pam_login_attribute sAMAccountName pam_passwd md5 idle_timeout 3600 nss_base_passwd dc=example,dc=com?one nss_base_group dc=example,dc=com?one sasl_secprops maxssf=0 krb5_ccname FILE:/tmp/krb5cc_0 /etc/pam.d/login auth sufficient pam_winbind.so auth sufficient pam_self.so no_warn auth include system # account account sufficient pam_winbind.so account requisite...
2005 Jun 22
2
Problem Connecting from Windows to Samba-OpenLDAP PDC
...G if /dev/urandom is not provided #tls_randfile /var/run/egd-pool # SSL cipher suite # See man ciphers for syntax #tls_ciphers TLSv1 # Client certificate and key # Use these, if your server requires client authentication. #tls_cert #tls_key # Disable SASL security layers. This is needed for AD. #sasl_secprops maxssf=0 # Override the default Kerberos ticket cache location. #krb5_ccname FILE:/etc/.ldapcache # SASL mechanism for PAM authentication - use is experimental # at present and does not support password policy control #pam_sasl_mech DIGEST-MD5 ssl no #tls_cacertdir /etc/openldap/cacerts pam_pass...