Jan-Frode Myklebust wrote:
On Tue, Sep 20, 2011 at 09:59:16AM -0400, Dmitri Pal wrote:
Password Hash Algorithm
-
Indicates the algorithm that the system should use to hash the password.
Currently supported values are SSHA, SHA, SMD5, and M
On Fri, 2011-09-23 at 10:20 +0200, Jan-Frode Myklebust wrote:
> On Tue, Sep 20, 2011 at 10:18:13AM -0400, Stephen Gallagher wrote:
> >
> > Specifically, the way SSSD behaves is as follows:
> > 1) Try to authenticate with Kerberos. If Kerberos responds that there's
> > no hash for this user,
> > 2)
On Tue, Sep 20, 2011 at 10:18:13AM -0400, Stephen Gallagher wrote:
>
> Specifically, the way SSSD behaves is as follows:
> 1) Try to authenticate with Kerberos. If Kerberos responds that there's
> no hash for this user,
> 2) Ask FreeIPA if migration mode is enabled, if it is,
> 3) Try to bind to F
On Tue, Sep 20, 2011 at 09:59:16AM -0400, Dmitri Pal wrote:
> >
> > Password Hash Algorithm
> > -
> > Indicates the algorithm that the system should use to hash the password.
> > Currently supported values are SSHA, SHA, SMD5, and MD5. A value of NONE
> >
On Tue, 2011-09-20 at 09:59 -0400, Dmitri Pal wrote:
> 3) After importing users use SSSD in migration mode (special setting in
> SSSD config). In this case for any user without kerberos hash who would
> log via SSSD the SSSD would connect IPA in a special way and trigger the
> Kerberos hash generat
On 09/20/2011 09:18 AM, Jan-Frode Myklebust wrote:
> We have an existing user database managed by Sun Identity Manager,
> which populates a centos-directory-server. The users in the directory
> server have all passwords hassed with SSHA, and "ipa migrate-ds" told me
> that the passwords has been mi
We have an existing user database managed by Sun Identity Manager,
which populates a centos-directory-server. The users in the directory
server have all passwords hassed with SSHA, and "ipa migrate-ds" told me
that the passwords has been migrated in pre-hashed format.
Luckily Sun Identity Manager