interesting, though.
--
Pascal Levy
Ingénieur réseaux ressources informatiques
Bibliothèque InterUniversitaire Sainte Geneviève
tél. : (33) 1 44 41 97 53
Bibliothèque InterUniversitaire de Langues Orientales
tél. : (33) 1 44 77 95 00
[EMAIL PROTECTED]
signature.asc
Description: This is a digitally
:
ldapsearch -H ldap://dc.ad.bsg.local -b dc=ad,dc=bsg,dc=local
sur Windows :
il faut installer le ressource Kit Windows (à télécharger sur microsoft.com)
pour utiliser klist.exe et ktray.exe (nom exact ?) qui permettent de voir les
tickets acquis dans une session Windows.
--
Pascal Levy
On Friday 10 October 2008 11:14:10 Guillaume Rousse wrote:
Pascal Levy a écrit :
(...)
That's sound really interesting, but I don't understand some points:
- how do you have AD knows it can get a kerberos ticket from the heimdal
KDC ? Did you set the user userPrincipalName attribute
On Friday 10 October 2008 23:49:04 Natxo Asenjo wrote:
On Fri, Oct 10, 2008 at 2:03 PM, Pascal Levy [EMAIL PROTECTED]
wrote:
I have (since long) to write a complete documentation for all this
things. for now, i only have a very partial one, about the trust between
realms and user mapping
there password by using normal windows change password
interface. Admins can use heimdal tools to manage passwords directly on the
kdc.
--
Pascal Levy
Ingénieur réseaux ressources informatiques
Bibliothèque InterUniversitaire Sainte Geneviève
tél. : (33) 1 44 41 97 53
Bibliothèque InterUniversitaire de