On 17.4.2015 01:46, Bryan Pearson wrote:
I ran this comand on each of my IPA servers and one returned usable
response: ipa idrange-find
---
1 range matched
---
Range name: HOSTNAME.LAN_id_range
First Posix ID of the range: 192020
Number of IDs in the
In an obviously blatant promotion exercise and attempt to build page
rank
Please could I have some critique on this article?
http://otternetworks.de/tech/freeipa-technical-brief/
Your feedback would be really appreciated
Thanks,
Andrew
--
Manage your subscription for the Freeipa-users
On Fri, 17 Apr 2015, Andrew Holway wrote:
In an obviously blatant promotion exercise and attempt to build page
rank
Please could I have some critique on this article?
http://otternetworks.de/tech/freeipa-technical-brief/
Your feedback would be really appreciated
Thanks for the nice
On Thu, Apr 16, 2015 at 07:46:55PM -0400, Bryan Pearson wrote:
I ran this comand on each of my IPA servers and one returned usable
response: ipa idrange-find
---
1 range matched
---
Range name: HOSTNAME.LAN_id_range
First Posix ID of the range: 192020
On Fri, Apr 17, 2015 at 09:14:33AM +0200, Andrew Holway wrote:
In an obviously blatant promotion exercise and attempt to build page
rank
Please could I have some critique on this article?
http://otternetworks.de/tech/freeipa-technical-brief/
Your feedback would be really appreciated
We setup our new IPA server (RHEL7) with a trust against our AD domain. The
trust and ID range look right in IPA
[root sssd]# ipa trust-show
Realm name: example.com
Realm name: EXAMPLE.COM
Domain NetBIOS name: EXAMPLE
Domain Security Identifier: S-1-5-21-
Trust direction: Two-way trust
Hi,
Any more things I can try out? How do we proceed?
Kind Regards,
D
2015-04-15 11:48 GMT+02:00 David Dejaeghere david.dejaegh...@gmail.com:
Hi Honza,
That gave me the exact same output. Any ideas?
Regards,
D
2015-04-15 7:33 GMT+02:00 Jan Cholasta jchol...@redhat.com:
Hi,
Dne
Hi,
I don't have any new information. I'm trying to reproduce the problem
but had no luck so far.
Honza
Dne 17.4.2015 v 15:23 David Dejaeghere napsal(a):
Hi,
Any more things I can try out? How do we proceed?
Kind Regards,
D
2015-04-15 11:48 GMT+02:00 David Dejaeghere
Bryan Pearson wrote:
Am I mistaken in your example:
You can find the master it is trying to talk to here:
$ ldapsearch -x -D 'cn=Directory Manager' -W -b
cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=example,dc=com
Mine:
$ ldapsearch -x -D 'cn=Directory Manager' -W -b
Am I mistaken in your example:
You can find the master it is trying to talk to here:
$ ldapsearch -x -D 'cn=Directory Manager' -W -b
cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=example,dc=com
Mine:
$ ldapsearch -x -D 'cn=Directory Manager' -W -b
cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=EXAMPLE,dc=lan
Bryan
I believe that my master dna server isnt currently being used, so I did this.
ldapsearch -x -D 'cn=Directory Manager' -W -b
cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=EXAMPLE,dc=lan
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=EXAMPLE,dc=lan with scope
Bryan Pearson wrote:
I believe that my master dna server isnt currently being used, so I did this.
ldapsearch -x -D 'cn=Directory Manager' -W -b
cn=posix-ids,cn=dna,cn=ipa,cn=etc,dc=EXAMPLE,dc=lan
Enter LDAP Password:
That's not the right location to search for the DNA configuration. See
You are going way to far back in time AFAICT. The certs expired on April
5 of this year so you don't need to go back to 2014. Just go back to
April 3 or 4.
You'll also need to restart IPA before kicking certmonger ipactl restart
rob
*** SNIP ***
Thanks!!
Following your advice,
John Williams wrote:
You are going way to far back in time AFAICT. The certs expired on April
5 of this year so you don't need to go back to 2014. Just go back to
April 3 or 4.
You'll also need to restart IPA before kicking certmonger ipactl restart
rob
*** SNIP ***
On Fri, Apr 17, 2015 at 06:36:24AM -0400, Bryan Pearson wrote:
Should I add the same range to this machine or give each one it's own id
range?
The ranges are global for the whole IPA domain. The idranges manages
with the ipa tool have their data in the replicated tree hence changes
are
On Fri, 17 Apr 2015, Gould, Joshua wrote:
We setup our new IPA server (RHEL7) with a trust against our AD domain.
The trust and ID range look right in IPA
[root sssd]# ipa trust-show
Realm name: example.com
Realm name: EXAMPLE.COM
Domain NetBIOS name: EXAMPLE
Domain Security Identifier:
On Fri, Apr 17, 2015 at 10:29:31AM -0400, Gould, Joshua wrote:
We setup our new IPA server (RHEL7) with a trust against our AD domain. The
trust and ID range look right in IPA
[root sssd]# ipa trust-show
Realm name: example.com
Realm name: EXAMPLE.COM
Domain NetBIOS name: EXAMPLE
Hi everyone,
I've spent a couple of days digging around the web, watching logs, and
poking things, and I'm stuck getting sudo working with IPA on a new box
I've just set up. I have had it working in the past on a test box, but
something about this box is blocking me, and I can't for the life of
On 4/17/15 9:53 AM, Dmitri Pal wrote:
On 04/17/2015 11:16 AM, Janelle wrote:
Hi,
Is anyone else having issues with OTP since upgrading? For the life
of me I can't get it to accept Sync for the tokens. No matter what
is put in, it just keeps saying the username, password or tokens
entered
On 04/17/2015 12:11 PM, Ash Alam wrote:
Hello
I wanted to get some input on what your approach is for admin
accounts. In the past i approached it where you have a user `John Doe`
he has a normal user account for everyday tasks (wifi, anything that
talks ldap). He also has an admin account
Hi,
Is anyone else having issues with OTP since upgrading? For the life of
me I can't get it to accept Sync for the tokens. No matter what is put
in, it just keeps saying the username, password or tokens entered are
incorrect.
To make it simple - I am tryign this on a brand new CentOS 7.1
On 04/17/2015 03:33 AM, Jan Pazdziora wrote:
On Fri, Apr 17, 2015 at 09:14:33AM +0200, Andrew Holway wrote:
In an obviously blatant promotion exercise and attempt to build page
rank
Please could I have some critique on this article?
http://otternetworks.de/tech/freeipa-technical-brief/
On 04/17/2015 11:16 AM, Janelle wrote:
Hi,
Is anyone else having issues with OTP since upgrading? For the life of
me I can't get it to accept Sync for the tokens. No matter what is
put in, it just keeps saying the username, password or tokens entered
are incorrect.
To make it simple - I
On 04/17/2015 01:20 PM, Janelle wrote:
On 4/17/15 9:53 AM, Dmitri Pal wrote:
On 04/17/2015 11:16 AM, Janelle wrote:
Hi,
Is anyone else having issues with OTP since upgrading? For the life
of me I can't get it to accept Sync for the tokens. No matter what
is put in, it just keeps saying the
On (17/04/15 11:32), Andrew Sacamano wrote:
Hi everyone,
I've spent a couple of days digging around the web, watching logs, and
poking things, and I'm stuck getting sudo working with IPA on a new box
I've just set up. I have had it working in the past on a test box, but
something about this box
On 4/17/15 1:19 PM, Dmitri Pal wrote:
On 04/17/2015 01:20 PM, Janelle wrote:
On 4/17/15 9:53 AM, Dmitri Pal wrote:
On 04/17/2015 11:16 AM, Janelle wrote:
Hi,
Is anyone else having issues with OTP since upgrading? For the life
of me I can't get it to accept Sync for the tokens. No matter
Thanks Lukas,
I'm very glad to have concrete debugging suggestions. I'll investigate as
you suggest and report back.
Thanks again,
Andrew
On Fri, Apr 17, 2015 at 2:28 PM, Lukas Slebodnik lsleb...@redhat.com
wrote:
On (17/04/15 11:32), Andrew Sacamano wrote:
Hi everyone,
I've spent a
Hello
I wanted to get some input on what your approach is for admin accounts. In
the past i approached it where you have a user `John Doe` he has a normal
user account for everyday tasks (wifi, anything that talks ldap). He also
has an admin account for when he needs to administer ipa, active
On 04/17/2015 11:21 PM, Janelle wrote:
On 4/17/15 5:59 PM, Dmitri Pal wrote:
On 04/17/2015 08:07 PM, Janelle wrote:
On Apr 17, 2015, at 16:36, Dmitri Pal d...@redhat.com
mailto:d...@redhat.com wrote:
On 04/17/2015 04:52 PM, Janelle wrote:
On 4/17/15 1:19 PM, Dmitri Pal wrote:
On
On 04/17/2015 09:12 PM, Benjamen Keroack wrote:
Hi,
We have a number of local groups on our IPA-managed servers that we
add LDAP/IPA users to. This works fine locally on the server on an ad
hoc basis:
$ usermod -a -G local-group test.user
However I'm trying to do this as part of user
On 4/17/15 5:59 PM, Dmitri Pal wrote:
On 04/17/2015 08:07 PM, Janelle wrote:
On Apr 17, 2015, at 16:36, Dmitri Pal d...@redhat.com
mailto:d...@redhat.com wrote:
On 04/17/2015 04:52 PM, Janelle wrote:
On 4/17/15 1:19 PM, Dmitri Pal wrote:
On 04/17/2015 01:20 PM, Janelle wrote:
On
On Apr 17, 2015, at 16:36, Dmitri Pal d...@redhat.com wrote:
On 04/17/2015 04:52 PM, Janelle wrote:
On 4/17/15 1:19 PM, Dmitri Pal wrote:
On 04/17/2015 01:20 PM, Janelle wrote:
On 4/17/15 9:53 AM, Dmitri Pal wrote:
On 04/17/2015 11:16 AM, Janelle wrote:
Hi,
Is anyone else
Hi,
We have a number of local groups on our IPA-managed servers that we add
LDAP/IPA users to. This works fine locally on the server on an ad hoc basis:
$ usermod -a -G local-group test.user
However I'm trying to do this as part of user provisioning in IPA via user
groups. I've created external
On 04/17/2015 04:52 PM, Janelle wrote:
On 4/17/15 1:19 PM, Dmitri Pal wrote:
On 04/17/2015 01:20 PM, Janelle wrote:
On 4/17/15 9:53 AM, Dmitri Pal wrote:
On 04/17/2015 11:16 AM, Janelle wrote:
Hi,
Is anyone else having issues with OTP since upgrading? For the
life of me I can't get it to
On 04/17/2015 08:07 PM, Janelle wrote:
On Apr 17, 2015, at 16:36, Dmitri Pal d...@redhat.com
mailto:d...@redhat.com wrote:
On 04/17/2015 04:52 PM, Janelle wrote:
On 4/17/15 1:19 PM, Dmitri Pal wrote:
On 04/17/2015 01:20 PM, Janelle wrote:
On 4/17/15 9:53 AM, Dmitri Pal wrote:
On
35 matches
Mail list logo