for reference in the near future. More
testing needs to be completed before it can be cleaned up and I am ready to
call it good.
Thanks again for your input!
Joe.
> On Dec 22, 2015, at 8:38 AM, Joe Honnold <joe_honn...@starkey.com> wrote:
>
> Thanks for the reply. I will give it a sh
Thanks for the reply. I will give it a shot and see what happens.
Cheers!
Joe.
On 12/22/15, 8:31 AM, "radiator-boun...@open.com.au on behalf of Heikki
Vatiainen" <radiator-boun...@open.com.au on behalf of h...@open.com.au> wrote:
>On 12/21/2015 05:23 AM, Joe Honno
Good day.
I am working on a project for sending users OTP’s to gain access. I would like
to have users authenticate to AD and once accepted use Authby OTP to generate a
token and send it to the user via SMS. The user would then enter the OTP and
gain access.
I have done a bit of researching
:
Hi,
sadly HoldServerConnection doesn't work for Active Directory for us.
Not sure if that's the source of your problem though.
If you search the Global Catalog (3268 for LDAP and 3269 for LDAPS) you can't
specify a BaseDN, leave it empty!
Just
BaseDN
Best regards, Alex
On 2015-12-15 18:18, Joe Honno
Hi.
I am working towards a config that does AD authentication with the addition of
OTP. I have started the AD config and have hit an issue that I can not seem to
get around.
The log file states:
Tue Dec 15 10:34:24 2015: DEBUG: Radius::AuthLDAP2 REJECT: Bad Encrypted
password: UserJ [UserJ]
We are evaluating the deployment of a wireless solution using Cisco
1200 AP's.
The requirement for the deployment is to use our existing Radiator
server and LDAP server.
I have looked through the list archives and see LEAP is out seeing that
user passwords are encrypted (SHA1) in LDAP.
As far