Not sure what’s happening here, but for some reason, AD is now rejecting the 
user I created for use with LTB for insufficient privileges (error 50). This 
user was specifically created with the minimum rights to change passwords. I’m 
using Self-service password v1.1, and this was working fine a couple of weeks 
ago. I have not altered the Windows server (other than to install Microsoft’s 
patch updates over time) or the special user I set up for the purpose of 
letting LTB change passwords. I’m stumped.

 

If I give the LTB user domain admin rights, everything works just fine, so it 
isn’t a communication issue with the server. Any idea what this could be?

 

One thing I noticed is that the entire delegate control wizard does not seem to 
offer the privileges I was used to seeing in the past.  For example, Write 
lockout time and write shadowlastchange are nowhere to be found…

 

Thanks!

Gray

 

 

Gray McCord

Adapt, Mutate, Migrate, or Die

                                                          -C. Darwin

_______________________________________________
ltb-users mailing list
ltb-users@lists.ltb-project.org
https://lists.ltb-project.org/cgi-bin/mailman/listinfo/ltb-users

Reply via email to