Hi Joseph,

 Here is a short overview what squid_kerb_ldap does.
1) A user authenticates with either NTLM (username will be NT-DOM\user) or Kerberos (username will be u...@kerb-dom) 2) squid_kerb_ldap uses the -N flag to map NT-DOM to KERB-DOM for NTLM authenticated users
  3) Uses DNS SRV records to find AD server for KERB-DOM
4) Uses the Kerberos Keytab to authenticate an ldap connection to AD using SASL/GSSAPI. 5) Searches AD if the user is member of the group given by -s ( The newer squid_kerb_ldap version has also an -m option to allow recursive search (e.g. check if a group is a member of another group ....)

 Does this help ?

Regards
Markus


"Joseph L. Casale" <[email protected]> wrote in message news:ca5a491e9defbe4cb777de97e21575e906bac...@prato.activenetwerx.local... We have a mixed 2k -> 2k8r2 environment. Currently I am using ntlm_auth and Samba for the 2k machines, and squid_kerb_auth/squid_ldap_auth for the newer machines to
manage access based on AD group membership.

Do I understand correctly that if I use squid_kerb_ldap with the -N I can provide group authentication for Kerb and NTLM based clients without an ldap bind account
for our AD ldap server that does not accept anonymous binds?

Thanks,
jlc


Reply via email to