Hi, guys,
I have successfully set up FreeRADIUS server to use Active Directory to
authenticate LAN users.
My authorize{} and authenticate{} section configuration in radiusd.conf
file looks like this:
authorize {
preprocess
eap
mschap
}
authenticate {
Auth-Type
David N'DAKPAZE wrote:
hello,
I am configuring freeradius for authentication with active
directory.I've used
http://deployingradius.com/documents/configuration/active_directory
but freeradius reject all the requests because of no known
password.It what i have when i make a request:
Ready
Hi,
i have been following this great guide
http://wiki.freeradius.org/FreeRADIUS_Active_Directory_Integration_HOWTO
on how to integrate freeradius with AD. I am getting confused about
kerberos5. Do i have to additionally install krb5 from ports? Or maybe
it should be on my system already
Alan DeKok wrote:
john wrote:
I am trying to connect a Windows XP/sp2 machine to my network using a
3com 3226 superstack switch as a NAS. This windows Client can
successfully authenticate via an wireless access point when using
WPA2/AES via PEAP/mschap2.
However when I plug the same client
Hi,
i am using FreeRADIUS 2.0.5. Successfull logins into cisco routers are
logged great (using Accounting), but i need to log also the failed
attempts. In /var/log/radius.log radius does log the failed attempts,
BUT if in clients.conf i have created client as 10.0.0.0/8 (a network,
not a
Hi,
I am using a passwd module to authorize users. First passwd module
checks cisco_users file (format = *User-Name:Cleartext-Password) and
then passwd module must check cisco_groups file (format =
~Cisco-Group:*,User-Name). However when passwd module checks the
cisco_user file, it returns
t...@kalik.net wrote:
I am using a passwd module to authorize users.
No, you are using passwd module to store passwords.
First passwd module
checks
It doesn't check anything - it returns the password stored for that user.
cisco_users file (format =
7 matches
Mail list logo