10-27-2008
Win 2003 AD is pretty much an LDAP server that you can use Pam_ldap or openldap tools with. As far as AD/LDAP maintenance tools, there are some open ones in Java, and PHP based ones also.
9 More Discussions You Might Find Interesting
1. HP-UX
Hey,
I've asked questions about this project here before and gotten lots of help so I figured I'd give it another try.
I've recently set up my HP-UX environment to authenticate to a Windows Active Directory server (Windows Server 2003 R2).
I setup an account on Active Directory which works... (2 Replies)
Discussion started by: Rike255
2 Replies
2. Red Hat
Hi all,
I'm having some problems with joining an active directory domain as a member. My Linux servers using the same configuration across the board are all joining as domain controllers, which is bad.
I am running Samba 3.0.25b-0.4E.6 on all of my RHEL servers.
Here is my global... (1 Reply)
Discussion started by: Bert
1 Replies
3. Solaris
Hi all. A while back i began looking a using Sun One JDS for our S10 environment which subsequently fell by the wayside as other more pressing things cropped up :-)
Now its ugly head has popped up again but with the prerequisite that we authenticate against AD.
So, i have a few questions.
... (6 Replies)
Discussion started by: boneyard
6 Replies
4. Web Development
I installed a wordpress theme and came across the following code contained in the functions.php (theme functions) file. I am wanting to make sure this code is not over-riding my adsense publisher id and replacing with theirs in the background. I had this happen on another theme and just wanting... (1 Reply)
Discussion started by: blueray1974
1 Replies
5. Shell Programming and Scripting
Hi,
Can any one please tell me the way to Authenticate success or failure of the login.
Here is my req:
I have to telnet to multiple unix servers and execute the a script there which will give me an integer output. This output should be directed to a txt file.
i dont want to provide... (1 Reply)
Discussion started by: csekhar05
1 Replies
6. Solaris
I've tried everything from changing permissions on the public and private keys to creating new keys and I still cannot authenticate my private key to another machines public key. Here is the ssh -vvv output:
ssh -vvv -i id_dsa account@x.x.45.137
OpenSSH_5.5p1, OpenSSL 1.0.0a 1 Jun 2010... (8 Replies)
Discussion started by: jastanle84
8 Replies
7. AIX
I have AD (active directory) user, "asdf", created and a matching local AIX user name. Using "kinit", I can successfully authenticate it against the MS AD but when they I try to login via SSH with the same user name, it doesn't work. How can I get AIX to allow kerberos authentication as a valid... (1 Reply)
Discussion started by: kah00na
1 Replies
8. Red Hat
hi ,
Im configuring web site with authencation to a folder but the authentication is not happening.
below is the conf file of /etc/httpd/conf/httpd.conf
<VirtualHost 192.168.1.4:80>
DocumentRoot /var/www/html/
ServerName redhatclient.example.com
<directory... (0 Replies)
Discussion started by: redhatlbug
0 Replies
9. UNIX for Advanced & Expert Users
I'm authenticating with SSSD / Kerberos against Windows Server 2012 R2. I've setup credentails delegation using these options:
Host *
GSSAPIAuthentication yes
GSSAPIDelegateCredentials yes
GSSAPITrustDns yes
For both client/server but no luck. I've read online that I need to run... (2 Replies)
Discussion started by: Devyn
2 Replies
LEARN ABOUT REDHAT
ldap_abandon
LDAP_ABANDON(3) Library Functions Manual LDAP_ABANDON(3)
NAME
ldap_abandon - Abandon an LDAP operation in progress
SYNOPSIS
#include <ldap.h>
int ldap_abandon(ld, msgid)
LDAP *ld;
int msgid;
DESCRIPTION
The ldap_abandon() routine is used to abandon or cancel an LDAP operation in progress. The msgid passed should be the message id of an
outstanding LDAP operation, as returned by ldap_search(3), ldap_modify(3), etc.
ldap_abandon() checks to see if the result of the operation has already come in. If it has, it deletes it from the queue of pending mes-
sages. If not, it sends an LDAP abandon operation to the the LDAP server.
The caller can expect that the result of an abandoned operation will not be returned from a future call to ldap_result(3).
ERRORS
ldap_abandon() returns 0 if everything goes ok, -1 otherwise, setting ld_errno appropriately. See ldap_error(3) for details.
SEE ALSO
ldap(3), ldap_result(3), ldap_error(3)
ACKNOWLEDGEMENTS
OpenLDAP is developed and maintained by The OpenLDAP Project (http://www.openldap.org/). OpenLDAP is derived from University of Michigan
LDAP 3.3 Release.
OpenLDAP 2.0.27-Release 22 September 1998 LDAP_ABANDON(3)