Re: [RADIATOR] Authby LDAP and Authby OTP

2015-12-28 Thread Joe Honnold
for reference in the near future. More testing needs to be completed before it can be cleaned up and I am ready to call it good. Thanks again for your input! Joe. > On Dec 22, 2015, at 8:38 AM, Joe Honnold <joe_honn...@starkey.com> wrote: > > Thanks for the reply. I will give it a sh

Re: [RADIATOR] Authby LDAP and Authby OTP

2015-12-22 Thread Joe Honnold
Thanks for the reply. I will give it a shot and see what happens. Cheers! Joe. On 12/22/15, 8:31 AM, "radiator-boun...@open.com.au on behalf of Heikki Vatiainen" <radiator-boun...@open.com.au on behalf of h...@open.com.au> wrote: >On 12/21/2015 05:23 AM, Joe Honno

[RADIATOR] Authby LDAP and Authby OTP

2015-12-20 Thread Joe Honnold
Good day. I am working on a project for sending users OTP’s to gain access. I would like to have users authenticate to AD and once accepted use Authby OTP to generate a token and send it to the user via SMS. The user would then enter the OTP and gain access. I have done a bit of researching

Re: [RADIATOR] AuthBy LDAP2 to AD

2015-12-19 Thread Joe Honnold
: Hi, sadly HoldServerConnection doesn't work for Active Directory for us. Not sure if that's the source of your problem though. If you search the Global Catalog (3268 for LDAP and 3269 for LDAPS) you can't specify a BaseDN, leave it empty! Just BaseDN Best regards, Alex On 2015-12-15 18:18, Joe Honno

[RADIATOR] AuthBy LDAP2 to AD

2015-12-15 Thread Joe Honnold
Hi. I am working towards a config that does AD authentication with the addition of OTP. I have started the AD config and have hit an issue that I can not seem to get around. The log file states: Tue Dec 15 10:34:24 2015: DEBUG: Radius::AuthLDAP2 REJECT: Bad Encrypted password: UserJ [UserJ]

(RADIATOR) Cisco 1200-Radius-LDAP

2004-01-05 Thread Joe Honnold
We are evaluating the deployment of a wireless solution using Cisco 1200 AP's. The requirement for the deployment is to use our existing Radiator server and LDAP server. I have looked through the list archives and see LEAP is out seeing that user passwords are encrypted (SHA1) in LDAP. As far