> Firstly, have you created a valid kerberos principal
> in the Solaris 9 KDC database for the ldap user in question ?

The user has following DN:
uid=bob,ou=people,ou=sale,ou=examplecity,dc=example,dc=com and the principal
is bob/sale.examplecity.example.com.
The mapping looks like
dsmatching-pattern: ${Principal}
dsmatching-regexp: (.*)/(.*).(.*)[EMAIL PROTECTED]
dsmappeddn: uid=$1,ou=people,ou=$2,ou=$3,dc=example,dc=com

>
> And for pam-kerberos to work correctly, you would need to setup
> pam.conf correctly for the required service (which in this case
> is login, I presume) on the client.

I did that too. The lines for authentication look like
(...)
auth    sufficient    pam_unix.so likeauth nullok
auth    sufficient pam_krb5.so use_first_pass
(...)

I'm not sure if the thing with the host principal worked well. Do I always
need a principal for the host and what's the easiest way to create a
principal for a Linux box on a Solaris KDC?

Thanks for answers,
Johannes


________________________________________________
Kerberos mailing list           [EMAIL PROTECTED]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to