|
thanks, this way did it.
--yedidia
fvt3 wrote:
I was able to strip the domain portion of it by having
radius execute an external script. Here is what I
have in radius to execute the external script..
ldap ldap_ldap1 {
server = ""
identity = ""
password = ""
#basedn = ""
basedn = ""
# filter =
"(SamAccountName=%{Stripped-User-Name:-%{User-Name}})"
filter =
"(SamAccountName=%{exec:/usr/local/freeradius/etc/raddb
/nodomain.pl %u})"
I wrote a perl script to strip that off, using a shell
script it always add a return character which adds a
space after the uid.
--- Yedidia Klein <[EMAIL PROTECTED]> wrote:
Hello list,
I'm using freeradius server as a radius server that
forward the auth to
an LDAP server,
on a RH enterprise system
(freeradius-1.0.1-1.1.RHEL3)
I want one of my service providers to authenticate
against this radius,
After enabling some debug option I found that it
sends me the users in
the form of [EMAIL PROTECTED], that (of course) my
ldap don't know and
refuse to auth.
Is there a way on freeradius to pass to the ldap
server only the left
site of the @ sign ?
I tried to use "with_ntdomain_hack = yes" in my ldap
section on
radiusd.conf w/o success.
thanks,
--Yedidia
-
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
|
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html