<freeipa-users@lists.fedorahosted.org>
To: freeipa-users@lists.fedorahosted.org
Cc: Jakub Hrozek <jhro...@redhat.com>
Date: 06/28/2017 07:47 AM
Subject:[Freeipa-users] Re: (no subject)
On Wed, Jun 28, 2017 at 07:04:58AM -0700, Sean Hogan via FreeIPA-users
wrote
Apologies..
My subject line was "SSSD not starting" but posted it to the old address.
Made a new email with the info and copy paste must have dropped it
Sean Hogan
From: Sean Hogan via FreeIPA-users
<freeipa-users@lists.fedorahosted.org>
To:
26/2017 02:17 PM
Subject:[Freeipa-users] Re: Port 389
On Thu, 2017-10-26 at 14:11 -0700, Sean Hogan via FreeIPA-users wrote:
> Hello IPA,
>
> Hopefully a quick question.
>
> RHEL 7.3 IPA 4.4
>
> I have been digging around RHEL docs
>
Hello IPA,
Hopefully a quick question.
RHEL 7.3 IPA 4.4
I have been digging around RHEL docs
https://access.redhat.com/solutions/357673 for firewall ports and it says
389 is required for replication of IPA servers and clients to IPA servers.
FreeIPA docs say this:
SSL/startTLS When
-users] Re: IPA Password Vault
On Mon, Jan 08, 2018 at 08:44:29AM -0700, Sean Hogan via FreeIPA-users
wrote:
>
>
> Hello,
>
> I have recently been looking into the password vault for IPA and would
> like to implement however I have not been able to find an answer to a
> complia
Hello,
I have recently been looking into the password vault for IPA and would
like to implement however I have not been able to find an answer to a
compliance question on it yet.
Does the IPA PW vault limit checking out the password for a shared id to
one person at a time? I am
Hello,
I used to be able to find a chart that showed RHEL version to IPA
version online but can no longer find it. Do you have a link to such info?
Need it for road-mapping or IPAs.
Sean Hogan
___
FreeIPA-users mailing list --
Issue resolved.. changed the host name to a more sane one and sudo working
without issue
Sean Hogan
From: Sean Hogan via FreeIPA-users
<freeipa-users@lists.fedorahosted.org>
To: freeipa-users <freeipa-users@lists.fedorahosted.org>
Cc: Sean Hogan <sch
Morning,
Having an issue with 6 test servers not allowing sudo even though they
are in the same hostgroup as other boxes that do allow sudo.
sss_sudo.log
(Tue Feb 20 15:31:59 2018) [sssd[sudo]] [sort_sudo_rules] (0x0400): Sorting
rules with higher-wins logic
(Tue Feb 20 15:31:59 2018)
Hello,
We are implementing OTP for a new deployment and we can log in with the
otp codes however when trying to sudo it fails. We would like to use the
2fa to log in but single factor is ok for sudo escalation. Is OTP supposed
to be getting involved when issuing sudo commands?
I was only able to read the Subject line and nothing further so take with
grain of salt
Here is the procedure I made a while ago for differ finding but the only
change in it would be the ciphers I imagine.
The following files control the ciphers in use
DirSrv
11 matches
Mail list logo