similar to: LDAPS on DC

Displaying 20 results from an estimated 2000 matches similar to: "LDAPS on DC"

2011 Apr 23
1
ldapsearch with samba4
Hi, I've got ldapsearch mostly working: root at morannon:/usr/local/samba/private/tls# ldapsearch '(sAMAccountName=dumaresq)' SASL/GSSAPI authentication started SASL username: administrator at XXX SASL SSF: 56 SASL data security layer installed. # extended LDIF # # LDAPv3 # base <> (default) with scope subtree # filter: (sAMAccountName=dumaresq) # requesting: ALL # results in
2015 May 02
2
LDAPS Configuration
Hi, I'm trying to convert my LDAP server into a LDAPS server to secure the users logins, but I don't know what's the procedure to do it. Someone knows any guide to do it? For now: - I've created a CA cert on the server - I've created the cert and key for the domain pdc - I've signed that cert with CA cert. - I've followed the post in samba wiki about
2017 Jan 11
4
SSL Certificate
Hello! Taking advantage of the email, I tried to make an ldap query with tls and I had an error .. Version Samba 4.4.4 samba-tool testparm -v --suppress-prompt|grep tls ldap ssl = start tls tls cafile = tls/ca.pem tls certfile = tls/cert.pem tls crlfile = tls dh params file = tls enabled = Yes tls keyfile = tls/key.pem tls
2015 Apr 17
1
LDAPS on DC
On Fri, 2015-04-17 at 10:46 +0200, Luca Olivetti wrote: > El 17/04/15 a les 06:26, Fred Smith ha escrit: > > I'm trying to confirm that LDAP traffic is encrypted on my Samba 4 DC. I > > have read and followed https://wiki.samba.org/index.php/Setup_LDAPS_on_a_DC > > but when I attempt to connect to the DC on port 636 or via ldaps:// or both > > via ldapsearch (linux)
2015 Oct 15
2
ldapsearch against Samba4 AD questions
Hi all, I'd like to perform some ldapsearch against my AD domain. And I'd like to be able to perform these ldapsearch using GSSAPI to avoid usage of password in scripts. DC are using default configuration file: ---------------------------------------- # Global parameters [global] workgroup = SAMBA.DOMAIN realm = SAMBA.DOMAIN.TLD netbios name = M707 server
2020 Oct 30
2
LDAPS & Windows Domain Controller
So is that a bind type not mentioned in the chart he referenced for ldp.exe? <https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771022(v=ws.11)#understanding-bind-options-for-ldap-authentication>Understanding bind options for LDAP authentication There are several authentication methods available in ldp that allow a client to bind to an LDAP
2020 Oct 30
2
LDAPS & Windows Domain Controller
> Samba 4.13 recently removed this support. > The issue is that while it was possible to use LDAPS in some situations, it was not possible to reliably determine the hostname to verify the TLS certificate, rendering the protection moot. > Furthermore, extensive work would have been required to fully implement the 'channel bindings' required to tie the Kerberos authentication Samba
2020 Oct 29
3
LDAPS & Windows Domain Controller
I have a Samba file server attempting to join an Active Directory domain using "$net ads join". The Domain Controller is running Windows Server 2019. I'd like to force samba to use port 636 (LDAPS) when making the LDAP connection. I've tried several settings in the smb.conf file, but when I check the LDAP packets, samba is still using port 389. The join domain call is successful,
2015 Jul 07
3
SASL DIGEST-MD5 NT_STATUS_INVALID_PARAMETER
I've googled and I believe that SASL method DIGEST-MD5 is supported and I see it in the samba startup, but it doesn't work. ldapsearch -Y DIGEST-MD5 -h dc03.mediture.dom SASL/DIGEST-MD5 authentication started ldap_sasl_interactive_bind_s: Operations error (1) additional info: SASL:[DIGEST-MD5]: Failed to start authentication backend: NT_STATUS_INVALID_PARAMETER [root at dc03 ~]# samba
2016 Apr 19
5
Ldapsearch against Samba 4
I'm setting up a test domain in order to try out Sudoers LDAP and have run into a problem that has my puzzled. On our production domain I can run a query such as: ldapsearch -LLL -p389 -h DC -u me at ourdomain.com.au -W -X -LLL -b "dc=ourdomain,dc=com,dc=au" -s sub However, running an equivalent search on a freshly installed test domain, using the exact same version of Samba
2016 Jun 07
2
ldapsearch & GSSAPI => Server not found in Kerberos database
Hi all, I've got on AD DC using Samba 4.4.3 on Centos7 which accept Kerberos connections (kinit is working), which accept ldapsearch with credentials but which refuse ldapsearch with GSSAPI. The issue does not seem to be coming from the client as I discovered this issue writing a script to test all 22 DC, and all 21 others DC are working well from that client. The error: SASL/GSSAPI
2012 Nov 21
2
DC with external LDAP
Hi! Is there a way to use an external LDAP server with Samba4 (eg. openldap) to authenticate users or alternatively to sync Samba's internal LDAP with other services like Radius? My goal is to enter all user credentials to either an external or Samba4 internal LDAP and make Samba, Radius, etc. use it for authentication / as a master when synchronizing user data. I already tried: 1.
2017 Feb 03
1
LDAP problem
Hello Vinicius, I did it and this was the answer: ldapsearch -H "ldaps://devsamba.lucas.ufes.br:636" -w '*********' -D "cn=administrator,cn=users,dc=lucas,dc=ufes,dc=br" -x -b "dc=lucas,dc=ufes,dc=br" -d1 ldap_url_parse_ext(ldaps://devsamba.lucas.ufes.br:636) ldap_create ldap_url_parse_ext(ldaps://devsamba.lucas.ufes.br:636/??base) ldap_sasl_bind
2016 Jun 15
1
ldapsearch & GSSAPI => Server not found in Kerberos database
Solved : ) Reminder of the issue: Every services (CIFS, Kerberos, LDAP, DNS, RPC) on one DC were working well and ldapsearch using DN and password were also working. The only thing which was not working was ldapsearch using GSSAPI authentication with the following error: SASL/GSSAPI authentication started ldap_sasl_interactive_bind_s: Local error (-2) additional info: SASL(-1): generic
2019 Aug 06
3
Configuration help
Distro : Debian 9 log samba and smb as attachments Le mar. 6 ao?t 2019 ? 09:33, Rowland penny via samba <samba at lists.samba.org> a ?crit : > On 06/08/2019 07:54, Guillaume Couvreur via samba wrote: > > Hello, here are the google logs. > > > > *[2019-08-05 17:04:31,544+0200] [SwingWorker-pool-1-thread-2] [ERROR] > > [plugin.ldap.AbstractLdapHandler] Failed to
2020 Oct 10
10
Mail samba
Hi I am trying to authenticate my mail server with samba ad. The only problem is that I don?t get it working. root at dna:/data/CA/EasyRSA-v3.0.6# ldapsearch -x -h gaia.rompen.lokaal -D 'vmail' -W -b 'cn=users,dc=rompen,dc=lokaal' Enter LDAP Password: ldap_bind: Strong(er) authentication required (8) additional info: BindSimple: Transport encryption required. I can not read
2019 Aug 06
1
Configuration help
Hai, If its really Debian 9, then i dont think, this is not going to work. >> /etc/openldap/ldap.conf I suggest the following. apt-get install ca-certificates mkdir -p /usr/local/share/ca-certificates/samba-ad-dc ln -s /var/lib/samba/private/tls/cert.pem /usr/local/share/ca-certificates/samba-ad-dc/samba.crt update-ca-certificates /etc/ldap/ldap.conf BASE dc=some,dc=dom,dc=tld URI
2005 Apr 16
1
Setting up Winbindd on 3.x
While I haven't gotten to the part that necessarily pertains to samba, I figured people on here may have tried to set this up before I'm trying to connect my freebsd 5.x server to a windows 2003 server. I have been using this tutorial http://oslabs.mikro-net.com/fbsd_samba.html I've gotten down to the part where I run ldapsearch using SSL/TLS and I get this minubian# ldapsearch
2012 Jan 23
1
Samba 4 GSSAPI problem
Hi Same checkout, same provision, same machine. openSUSE samba --version Version 4.0.0alpha18-GIT-c3a7573 hh3:/home/steve # ldapsearch -H ldap://192.168.1.3 cn=steve2 -b "dc=hh3,dc=site" -Y GSSAPI SASL/GSSAPI authentication started <snip> and all is OK. Ubuntu samba --version Version 4.0.0alpha18-GIT-c3a7573 root at hh3:/tmp# ldapsearch -H ldap://192.168.1.3 cn=steve2 -b
2002 Feb 23
2
Using LDAP and Samba I'm getting a stange error
Does anyone know what the following error means, and what I can do to fix it?? [root@trouble openldap]# ldapadd -D "cn=root,o=smb,dc=picotech,dc=net" -W Enter LDAP Password: ldap_sasl_interactive_bind_s: No such attribute ------------- Jeffrey D. Means CIO for PicoTech Ft. Collins, Colorado -------------- next part -------------- HTML attachment scrubbed and removed