On 25.9.2013 08:20, Christian Horn wrote:
On Tue, Sep 24, 2013 at 11:23:29AM -0600, Erinn Looney-Triggs wrote:
I wanted to bring up the idea of integrating TLSA records into FreeIPA
so that a host that is issued a certificate for say the web server (via
dogtag) would also publish that informatio
On Tue, Sep 24, 2013 at 11:23:29AM -0600, Erinn Looney-Triggs wrote:
> I wanted to bring up the idea of integrating TLSA records into FreeIPA
> so that a host that is issued a certificate for say the web server (via
> dogtag) would also publish that information in DNS using a TLSA record.
> This is
On 24.9.2013 19:23, Erinn Looney-Triggs wrote:
I wanted to bring up the idea of integrating TLSA records into FreeIPA
so that a host that is issued a certificate for say the web server (via
dogtag) would also publish that information in DNS using a TLSA record.
This is very much like how SSHFP re
I wanted to bring up the idea of integrating TLSA records into FreeIPA
so that a host that is issued a certificate for say the web server (via
dogtag) would also publish that information in DNS using a TLSA record.
This is very much like how SSHFP records are handled now in FreeIPA.
Has this been
On Tue, Sep 24, 2013 at 03:00:22PM +0400, Михаил А wrote:
> [sssd]
> services = nss, pam, ssh
> config_file_version = 2
> debug_level = 5
> domains = ipa.sys.local
Please put the debug_level directive to the [domain] section and then
attach /var/log/sssd/sssd_$domain.log
_
[sssd]
services = nss, pam, ssh
config_file_version = 2
debug_level = 5
domains = ipa.sys.local
2013/9/24 Sumit Bose
> On Tue, Sep 24, 2013 at 01:39:28PM +0400, Михаил А wrote:
> > Hello.
> > freeipa-server-3.3fedora19
> > ipa-replica1-fedora19
> > ipa-replica2 ferdora19
> >
> > ssh auth with w
On Tue, 24 Sep 2013, Alexandre Ellert wrote:
Hi,
I've successfully setup a testing environment with an IPA server (RHEL 6.4) and
a cross realm trust with my Active Directory (Win2008 R2).
Authentication works both with AD passwords and Kerberos GSS-API.
Now, I'm trying to find the way to manag
Hi,
I've successfully setup a testing environment with an IPA server (RHEL 6.4) and
a cross realm trust with my Active Directory (Win2008 R2).
Authentication works both with AD passwords and Kerberos GSS-API.
Now, I'm trying to find the way to manage ssh key which belong to AD users. It
seems t
On 23/09/13 13:57, John Dennis wrote:
Oh by the way, you could help us and file a bug on the spanish
translation so we can get the translation fixed.
Of course,
thanks!
--
Arturo Borrero González
Departamento de Seguridad Informática (n...@cica.es)
Centro Informático Científico de Andalucía
On Tue, Sep 24, 2013 at 01:39:28PM +0400, Михаил А wrote:
> Hello.
> freeipa-server-3.3fedora19
> ipa-replica1-fedora19
> ipa-replica2 ferdora19
>
> ssh auth with windows accounts on ipa-replica1-fedora19 is OK
> ssh auth with windows accounts on ipa-replica1-fedora19 is acces denied
>
>
> id
Hello.
freeipa-server-3.3fedora19
ipa-replica1-fedora19
ipa-replica2 ferdora19
ssh auth with windows accounts on ipa-replica1-fedora19 is OK
ssh auth with windows accounts on ipa-replica1-fedora19 is acces denied
id winuser@windomain OK
var/log/secure
selinux disabled
firewaldd disabled
11 matches
Mail list logo