Sponsored Content
Full Discussion: ldap and active directory
Operating Systems Linux Red Hat ldap and active directory Post 302431166 by falagar81 on Monday 21st of June 2010 05:27:23 AM
Old 06-21-2010
si, in questo modo puoi sincornizzare le autenticazioni fatte con RADIUS con openldap (o 389-ds).

Smilie

Last edited by falagar81; 06-21-2010 at 06:53 AM..
 

8 More Discussions You Might Find Interesting

1. Windows & DOS: Issues & Discussions

unix and active directory

Hi Does anybody know the steps and requirements of the installation process of Windows Active Directory using Unix/Linux Bind DNS. I will appreciate if somebody gives the answer. (1 Reply)
Discussion started by: Darwin Rodrigue
1 Replies

2. UNIX for Advanced & Expert Users

LDAP request from unix into Active Directory

Hi all, I experienced a problem when making a LDAP search from Unix Netscape or Unix Mozilla adressbooks into my Active Directory LDAP db for email addresses. I add my Domain Controller hostname and the LDAP root dir to search in. For example: Name: AD LDAP server: gullvi Search Root:... (0 Replies)
Discussion started by: tonlu
0 Replies

3. UNIX for Dummies Questions & Answers

setup active directory

i would like to ask about unix with active directory..actually my situation is at ny place there already have dns server in unix based,i want to implement an active directory to the network..from what i read about active directory we have to used bind dns...some say that bind could not handle in... (1 Reply)
Discussion started by: nour
1 Replies

4. UNIX for Advanced & Expert Users

Compiling Samba from Source on AIX, Active Directory, LDAP, Kerberos

Hello, I asked this question in the AIX subforum but never received an answer, probably because the AIX forum is not that heavily trafficked. Anyway, here it is.. I have never had any issues like this when compiling applications from source. When I try to compile samba-3.5.0pre2, configure runs... (9 Replies)
Discussion started by: raidzero
9 Replies

5. Solaris

LDAP Problem during Kerberos setting for Win server 03 Active Directory

Hi, FYI, I'm new in Solaris I'm trying to use Kerberos on authenticating LDAP Client with the Active Directory on Windows Server 2003 on both Solaris 10 5/08 and Solaris 10 9/10 by referring to the pdf file kerberos_s10.pdf available at sun official site. ... (0 Replies)
Discussion started by: chongzh
0 Replies

6. UNIX for Advanced & Expert Users

Active Directory with 6.1

Is there anyone who is utilizing Active Directory (2008R2) for AIX user account management? If yes or if AD is possible with AIX systems, can you please share what to be done to get there? Please advise. (1 Reply)
Discussion started by: Daniel Gate
1 Replies

7. Shell Programming and Scripting

Script to extract data from Active Directory and import in Zimbra Ldap

Hello Experts, I have this specific requirment where i need to download/extract from AD (Firstname, LastName, etc) and upload the same to Ldap used by Zimbra mail server running on Suse Linux. I know how to manually do that, but that is the not the solution. I am not yet sure on how to start... (3 Replies)
Discussion started by: Siddheshk
3 Replies

8. UNIX for Beginners Questions & Answers

Active Directory OR LDAP

Hi, How can we check users added through LDAP or AD. Users added through a group of AD or LDAP group. (2 Replies)
Discussion started by: Nishit
2 Replies
RADIUS.CONF(5)						    InterNetNews Documentation						    RADIUS.CONF(5)

NAME
radius.conf - Configuration for nnrpd RADIUS authenticator DESCRIPTION
This describes the format and attributes of the configuration file for the nnrpd RADIUS authenticator. See radius(1) for more information about the authenticator program. The default location for this file is radius.conf in pathetc. Blank lines and lines beginning with "#" are ignored, as is anything after a "#" on a line. All other lines should begin with a parameter name followed by a colon and the value of that key, except that each section of configuration for a particular server should be enclosed in: server <name> { # parameters... } where <name> is just some convenient label for that server. The available parameters are: radhost The hostname of the RADIUS server to use for authentication. This parameter must be set. radport The port to query on the RADIUS server. Defaults to 1645 if not set. lochost The hostname or IP address making the request. The RADIUS server expects an IP address; a hostname will be translated into an IP address with gethostbyname(). If not given, this information isn't included in the request (not all RADIUS setups require this information). locport The port the client being authenticated is connecting to. If not given, defaults to 119. This doesn't need to be set unless readers are connecting to a non-standard port. secret The shared secret with the RADIUS server. If your secret includes spaces, tabs, or "#", be sure to include it in double quotes. This parameter must be set. prefix Prepend the value of this parameter to all usernames before passing them to the RADIUS server. Can be used to prepend something like "news-" to all usernames in order to put news users into a different namespace from other accounts served by the same server. If not set, nothing is prepended. suffix Append the value of this parameter to all usernames before passing them to the RADIUS server. This is often something like "@example.com", depending on how your RADIUS server is set up. If not set, nothing is appended. ignore-source Can be set to "true" or "false". If set to false, the RADIUS authenticator will check to ensure that the response it receives is from the same IP address as it sent the request to (for some added security). If set to true, it will skip this verification check (if your RADIUS server has multiple IP addresses or if other odd things are going on, it may be perfectly normal for the response to come from a different IP address). EXAMPLE
Here is a configuration for a news server named news.example.com, authenticating users against radius.example.com and appending "@example.com" to all client-supplied usernames before passing them to the RADIUS server: server example { radhost: radius.example.com lochost: news.example.com secret: IamARADIUSsecRET suffix: @example.com } The shared secret with the RADIUS server is "IamARADIUSsecRET". HISTORY
This documentation was written by Russ Allbery <rra@stanford.edu> based on the comments in the sample radius.conf file by Yury B. Razbegin. $Id: radius.conf.pod 8200 2008-11-30 13:31:30Z iulius $ SEE ALSO
radius(1) INN 2.5.3 2009-05-21 RADIUS.CONF(5)
All times are GMT -4. The time now is 09:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy