New member to the list, here. I have a question about AD computer-based
authentication. Basically, how is it accomplished?
I have Googled and Googled, but only found references to the fact that it *can*
be done (mostly from archives of this list), but little reference on HOW to do
it, other
McNutt, Justin M. wrote:
New member to the list, here. I have a question about AD computer-based
authentication. Basically, how is it accomplished?
http://deployingradius.com/documents/configuration/active_directory.html
It's pretty much the same as normal user authentication. PEAP goes
McNutt, Justin M. wrote:
New member to the list, here. I have a question about AD
computer-based
authentication. Basically, how is it accomplished?
http://deployingradius.com/documents/configuration/active_directory.html
It's pretty much the same as normal user authentication.
Two comments about posting logs ...
#1 Post the entire log of radiusd -X (NOT -XX, that has a bunch of timestamps
we don't need) and don't redact anything that's not privileged info, you can
very easily remove the portion of the log that holds the answer to your
questions.
#2 your output of
I'm looking at having freeradius log accounting information to an MS-SQL
database on our centralised logging box.
Googling returns a lot of pages on this. I had a look in at them but many
relate to freeradius 1. Before I go making a lot of work for myself needlessly
- could anyone outline
Mark Holmes wrote:
I'm looking at having freeradius log accounting information to an MS-SQL
database on our centralised logging box.
This shouldn't be a problem. The ODBC layer works.
Googling returns a lot of pages on this. I had a look in at them but many
relate to freeradius 1.
Amit Nath wrote:
I am attempting to authenticate end-users via EAP-TTLS (with EAP-MD5) as
the inner method.
I have noticed that the Access-Accept Message does NOT contain the right
VSA attributes, nor the dynamic VLAN assignments.
Read raddb/eap.conf. Look for use_tunneled_reply.
Alan
7 matches
Mail list logo