Re: Creating Active Directory Objects

2007-11-09 Thread Michael Ströder
Geert Jansen wrote:
> 
> Forget about using LDAP to change a user's password. It can be done but
> it requires 128-bit SSL and so you need to set up certificate services
> and distribute the CA certificate to your client. An easier way is to
> use the Kerberos Set Password protocol (RFC3244). MIT Kerberos 1.3 and
> later support this protocol. Unfortunately there is no command-line
> interface to this call so you need to create a Python extension module
> for wrapping this call.
> 
> My (in progress) project FreeADI contains a wrapper for the Set Password
> call. See the file "/trunk/freeadi/core/_krb5.c" on my Trac page at
> freeadi.org. The code is available under the liberal MIT license.

If you're already on that route you might be interested in the
heimdal-wrapper module by Univention. Its license is GPL. Not sure
whether they support the Set Password protocol though.

Ciao, Michael.

-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
___
Python-LDAP-dev mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/python-ldap-dev


Re: Creating Active Directory Objects

2007-11-09 Thread Mike Matz
Thank you to all who responded to my queries.  I have been able to  
successfully create an account and set the password for an AD user on  
my test server.  For those who are interested here is the breakdown of  
what I did.  As I continue to debug and test I will post updates to  
this topic.

Connected via SSL to the server.  There is no need to manage  
certificates on the client since I am not binding, only establishing  
an LDAP connection.  Certificate Services do need to be installed on  
the server.  In the future I plan to try to implement the sasl_bind  
code that Michael mentioned.  To create the account I performed an  
ldap add and to set the password I performed a modify on the  
unicodePwd attribute.  This has appeared to work successfully.  I am  
able to authenticate as the newly created user, map a home directory,  
etc.  I will need to do further testing to ensure that this is a valid  
method for creating an account.

Once again, thanks to all who provided input!
Regards,
Mike


On Nov 9, 2007, at 4:35 AM, Michael Ströder wrote:

> Geert Jansen wrote:
>>
>> Forget about using LDAP to change a user's password. It can be done  
>> but
>> it requires 128-bit SSL and so you need to set up certificate  
>> services
>> and distribute the CA certificate to your client. An easier way is to
>> use the Kerberos Set Password protocol (RFC3244). MIT Kerberos 1.3  
>> and
>> later support this protocol. Unfortunately there is no command-line
>> interface to this call so you need to create a Python extension  
>> module
>> for wrapping this call.
>>
>> My (in progress) project FreeADI contains a wrapper for the Set  
>> Password
>> call. See the file "/trunk/freeadi/core/_krb5.c" on my Trac page at
>> freeadi.org. The code is available under the liberal MIT license.
>
> If you're already on that route you might be interested in the
> heimdal-wrapper module by Univention. Its license is GPL. Not sure
> whether they support the Set Password protocol though.
>
> Ciao, Michael.
>
> -
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems?  Stop.
> Now Search log events and configuration files using AJAX and a  
> browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> ___
> Python-LDAP-dev mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/python-ldap-dev


-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
___
Python-LDAP-dev mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/python-ldap-dev


Re: Creating Active Directory Objects

2007-11-09 Thread Michael Ströder
Mike Matz wrote:
> In the future I plan to try to implement the sasl_bind  
> code that Michael mentioned.

In the past after invoking kinit command-line tool for getting a TGT I
was successful sending a SASL bind with mech GSSAPI with python-ldap,
OpenLDAP libs and heimdal. But not sure about whether this all works
together with a recent version of heimdal...


Ciao, Michael.

-
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
___
Python-LDAP-dev mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/python-ldap-dev