I'm sorry, I didn't make what we're doing clear. Our MIT KDC is our master for our realm, our AD domain trusts that realm. We add/modify/delete users on our MIT KDC & AD based on our LDAP directory.

All of our user's passwords are kept solely by the KDC. The GSSAPI LDAP module also includes PAM functionality so our LDAP servers use pam_krb5 to authenticate - so no crypted password hashes in LDAP. When we push down the users to AD, we set the password field there to a long, random, good, password - the trust allows the users to authenticate solely from the MIT KDC.

So, in the AD case, we just set the appropriate LDAP attribute for each user to the crypted passwd string. This user replication process is one of the many tools that uses Perl-LDAP & GSSAPI/SASL.

Our tools we give our users to change their password (web based, Unix kpasswd, and Windows Ctrl-Alt-Del still works) only need to change it on the MIT KDC. Those tools use the standard library functions or the Windows equivalent.

Now if only Microsoft would fix their PKINIT implementation so it would pass requests to trusted domains like the password functions do I'd be happy.

Thanks,
Craig




Markus Moeller wrote:
To point 2) I would do the password change through Kerberos kpasswd or if you need to do it as an admin I think there is also a function in the MIT library to do so.

Regards
Markus

"Craig Huckabee" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]

Markus,

 Two reasons:

1) We are working towards turning off non-SSL access to our Sun LDAP servers.

2) We ran into problems when talking to AD using Perl-LDAP/SASL without SSL. IIRC, we couldn't do a password change over a non-SSL port - AD spit back an error. Doing everything over SSL cleared up the problems.

But, yes, in most cases we could just use one or the other.

--Craig


Markus Moeller wrote:


Craig,

you say you use SASL + SSL. As far as I know SASL/GSSAPI can do encryption too. What was the reason not to use SASL/GSSAPI with encryption. And example is AD, which can be accessed via SASL/GSSAPI with encryption.

Thanks
Markus

"Craig Huckabee" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]


Kent Wu wrote:


So my question is that is it pretty easy to enable Kerberos for SUN LDAP after installing SEAM? Or can SUN LDAP use other KDC as well?

We use Sun's LDAP server with PADL's GSSAPI plugin - we built our copy against MIT Kerberos 1.3.x and use MIT KDCs. I think the binary versions they sold previously also use MIT Kerberos.

We now have several processes that regularly use only GSSAPI/SASL over SSL to authenticate and communicate with LDAP. Works very well.

HTH,
Craig

________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos





________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos


________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos





________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos



________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to