On Fri, January 17, 2014 16:37, Rob Crittenden wrote:
Sigbjorn Lie wrote:
This worked better than expected. Thank you! :)
ipa01 and ipa02 seem to be happy again, getcert list no longer displays
any certificates out
of date, and all certificates in need of renewal within 28 days has
On 01/31/2014 10:00 AM, Sigbjorn Lie wrote:
On Fri, January 17, 2014 16:37, Rob Crittenden wrote:
Sigbjorn Lie wrote:
This worked better than expected. Thank you! :)
ipa01 and ipa02 seem to be happy again, getcert list no longer displays
any certificates out
of date, and all
please help im stuck trying to finish this winsync agreement
[r...@se-idm-01.boingo.com slapd-BOINGO-COM]$ ipa-replica-manage connect
--winsync --binddn cn=idm admin, cn=Users, dc=boingoqa, dc=local --bindpw
*** --passsync --cacert=/etc/openldap/cacerts/boingoqaCA.cer
On 01/31/2014 12:59 PM, Todd Maugh wrote:
please help im stuck trying to finish this winsync agreement
[r...@se-idm-01.boingo.com slapd-BOINGO-COM]$ ipa-replica-manage
connect --winsync --binddn cn=idm admin, cn=Users, dc=boingoqa,
dc=local --bindpw *** --passsync
RE:
I am not sure I was clear. It seems that you provided the LDAP trace for the
ldapsearch commands you executed above. I was talking about the DS level logs
for the replica management agreement establishment and the follow up
replication.
here is the log tailed while I deleted teh
Sure thing! I'll send them to you in private.
Regards
Siggi
Dmitri Pal d...@redhat.com wrote:
On 01/31/2014 10:00 AM, Sigbjorn Lie wrote:
On Fri, January 17, 2014 16:37, Rob Crittenden wrote:
Sigbjorn Lie wrote:
This worked better than expected. Thank you! :)
ipa01 and ipa02 seem to be
Sigbjorn Lie wrote:
On Fri, January 17, 2014 16:37, Rob Crittenden wrote:
Sigbjorn Lie wrote:
This worked better than expected. Thank you! :)
ipa01 and ipa02 seem to be happy again, getcert list no longer displays any
certificates out
of date, and all certificates in need of renewal
[r...@se-idm-01.boingo.com cacerts]$
LDAPTLS_CACERTDIR=/etc/dirsrv/slapd-BOINGO-COM/ ldapsearch -LLLx -ZZ -H
ldap://qatestdc2.boingoqa.local -b cn=idm admin,cn=users,dc=boingoqa,dc=local
-D cn=idm admin,cn=users,dc=boingoqa,dc=local -W
Enter LDAP Password:
dn: CN=IDM
thank you for the reply. here is the out put of the first command. I'm going to
run the second now and will reply with that as well
LDAPTLS_CACERTDIR=/etc/dirsrv/slapd-BOINGO-COM/ ldapsearch -d 1 -LLLx -ZZ -H
ldap://qatestdc2.boingoqa.local -b cn=idm admin,cn=users,dc=boingoqa,dc=local
-D
On 01/31/2014 01:55 PM, Todd Maugh wrote:
[r...@se-idm-01.boingo.com cacerts]$
LDAPTLS_CACERTDIR=/etc/dirsrv/slapd-BOINGO-COM/ ldapsearch -LLLx -ZZ
-H ldap://qatestdc2.boingoqa.local -b cn=idm
admin,cn=users,dc=boingoqa,dc=local -D cn=idm
admin,cn=users,dc=boingoqa,dc=local -W
Enter LDAP
For the second Command I do not have an account called directory manager, so I
do not have a password
ldapsearch -LLLx -b cn=config -D cn=directory manager -W
'objectclass=nsdswindowsreplicationagreement' dn
Enter LDAP Password:
ldap_bind: Invalid credentials (49)
I used the IPA directory manager password and got no output
[r...@se-idm-01.boingo.com cacerts]$ ldapsearch -LLLx -b cn=config -D
cn=directory manager -W 'objectclass=nsdswindowsreplicationagreement' dn
Enter LDAP Password:
From: Todd Maugh
Sent: Friday,
On 01/31/2014 02:09 PM, Todd Maugh wrote:
thank you for the reply. here is the out put of the first command. I'm
going to run the second now and will reply with that as well
LDAPTLS_CACERTDIR=/etc/dirsrv/slapd-BOINGO-COM/ ldapsearch -d 1 -LLLx
-ZZ -H ldap://qatestdc2.boingoqa.local -b cn=idm
On 01/31/2014 02:14 PM, Todd Maugh wrote:
I used the IPA directory manager password and got no output
[r...@se-idm-01.boingo.com cacerts]$ ldapsearch -LLLx -b cn=config
-D cn=directory manager -W
'objectclass=nsdswindowsreplicationagreement' dn
Enter LDAP Password:
Very strange. Try
Ok that time i got output
[r...@se-idm-01.boingo.com slapd-BOINGO-COM]$ ldapsearch -LLLx -b cn=config
-D cn=directory manager -W 'objectclass=nsds5replicationagreement'
Enter LDAP Password:
dn: cn=meTose-idm-02.boingo.com,cn=replica,cn=dc\3Dboingo\2Cdc\3Dcom,cn=mappin
g tree,cn=config
cn:
Hi Dmitri,
I am using Free Ipa 3.1.5 on Fedora 18. The design basically looks like the
following. All of this is hosted at AWS in our VPC. The nginx
box is on a web addressable subnet while the FreeIPA box is on a private
subnet that is not internet accessible. My goal is to be able to use the
On 01/31/2014 05:00 PM, Todd Maugh wrote:
got a new CA cert and seem to be in buisness
[r...@se-idm-01.boingo.com cacerts]$ ipa-replica-manage connect
--winsync --binddn cn=idm admin, cn=Users, dc=boingoqa, dc=local
--bindpw g0_b0ing0 --passsync l0v3ish@rd
asked: Can you provide your /etc/openldap/ldap.conf?
answer:
/etc/openldap/ldap.con
#File modified by ipa-client-install
URI ldaps://se-idm-01.boingo.com
BASE dc=boingo,dc=com
TLS_CACERT /etc/ipa/ca.crt
TLS_CACERTDIR /etc/openldap/cacerts/
TLS_REQCERT allow
ping
TLS: certificate
18 matches
Mail list logo