Re: OpenLDAP + Kerberos +smbldap-tools

2005-07-21 Thread Michael Marziani
This is probably a question for the OpenLDAP list, but I'm pretty sure that openldap doesn't support kerberos authentication natively, they chose to go with SASL instead which supports the GSSAPI method which supports Kerberos 5. So I don't think you can use the entry you use for the 'rootpw'

Re: Solaris 9 Authentication

2005-06-29 Thread Michael Marziani
Decrypt integrity check errors usually point to a keytab problem. Although I'm somewhat unsure why you had to copy your kadm5.keytab from the master server, you should have instead created keytabs for each host. In my setup (we use Solaris 9 SEAM KDCs with Solaris 9 and Red Hat clients) for each

Re: KADMIN AND DELEGATED ADMINISTRATION

2005-06-29 Thread Michael Marziani
Read the man page for kadm5.acl. This file controls access and delegation for the kerberos database. I'm pretty sure it can do most if not all of what you want. -Michael --- [EMAIL PROTECTED] wrote: Hi I'm new to Kerberos so forgive the question...this is about the use of kadmin access

Re: Implementing a Kerberos application

2005-06-29 Thread Michael Marziani
Not to offend you, but a simple google search for single sign-on kerberos reveals a lot of information on this subject. The 2nd link that came up for me was a guide to Kerberos single sign-on in Java: http://java.sun.com/j2se/1.4.2/docs/guide/security/jgss/single-signon.html Hope this helps get

Re: kprop fails on multihomed KDCs set up according to FAQ (solved)

2005-06-27 Thread Michael Marziani
Many thanks to the people that helped me with this. After a few dead ends I decided to just compile the MIT code on my Solaris 9 box and see if the kprop included with that would work. Turns out it worked just fine, and communicated with the Sun SEAM KDCs with no problems. I'm not sure at what

kpropd fails on multihomed KDCs set up according to FAQ

2005-06-24 Thread Michael Marziani
I have scoured the internet for information on this error and found what should be the answer in the Kerberos FAQ, only it still isn't working. I'm running from kdc1: /usr/krb5/sbin/kdb5_util dump /usr/krb5/lib/krb5kdc/slave_datatrans then: /usr/krb5/sbin/kprop -f