Sponsored Content
Operating Systems AIX Users not authenticating via Kerberos on MS AD Post 302479489 by kah00na on Friday 10th of December 2010 11:10:15 PM
Old 12-11-2010
I kind of figured this out. Actually I ended up doing it a little differently. You can see it in my other post:

Authenticate AIX users from MS Active Directory
 

9 More Discussions You Might Find Interesting

1. HP-UX

HP-UX authenticating to Active Directory

Hey, I've asked questions about this project here before and gotten lots of help so I figured I'd give it another try. I've recently set up my HP-UX environment to authenticate to a Windows Active Directory server (Windows Server 2003 R2). I setup an account on Active Directory which works... (2 Replies)
Discussion started by: Rike255
2 Replies

2. Red Hat

Samba: Authenticating and joining AD domain as a member

Hi all, I'm having some problems with joining an active directory domain as a member. My Linux servers using the same configuration across the board are all joining as domain controllers, which is bad. I am running Samba 3.0.25b-0.4E.6 on all of my RHEL servers. Here is my global... (1 Reply)
Discussion started by: Bert
1 Replies

3. AIX

Authenticating users to ADS

It is possible to authenticate AIX-users to the Windows 2003 Active Directory. But is it also possible to do full useradministration in the ADS without also adding users to the local AIX-server? I have the following working: 1. Add user to the ADS 2. Add user to AIX with 'mkuser... (2 Replies)
Discussion started by: jacco
2 Replies

4. Solaris

Solaris 10 authenticating to AD

Hi all. A while back i began looking a using Sun One JDS for our S10 environment which subsequently fell by the wayside as other more pressing things cropped up :-) Now its ugly head has popped up again but with the prerequisite that we authenticate against AD. So, i have a few questions. ... (6 Replies)
Discussion started by: boneyard
6 Replies

5. Shell Programming and Scripting

Authenticating user ID and Password

Hi, Can any one please tell me the way to Authenticate success or failure of the login. Here is my req: I have to telnet to multiple unix servers and execute the a script there which will give me an integer output. This output should be directed to a txt file. i dont want to provide... (1 Reply)
Discussion started by: csekhar05
1 Replies

6. Solaris

Key not authenticating to another machine

I've tried everything from changing permissions on the public and private keys to creating new keys and I still cannot authenticate my private key to another machines public key. Here is the ssh -vvv output: ssh -vvv -i id_dsa account@x.x.45.137 OpenSSH_5.5p1, OpenSSL 1.0.0a 1 Jun 2010... (8 Replies)
Discussion started by: jastanle84
8 Replies

7. Red Hat

Not authenticating in apache server site for a folder

hi , Im configuring web site with authencation to a folder but the authentication is not happening. below is the conf file of /etc/httpd/conf/httpd.conf <VirtualHost 192.168.1.4:80> DocumentRoot /var/www/html/ ServerName redhatclient.example.com <directory... (0 Replies)
Discussion started by: redhatlbug
0 Replies

8. UNIX for Advanced & Expert Users

Authenticating with SSSD / Kerberos against Windows Server 2012 R2

I'm authenticating with SSSD / Kerberos against Windows Server 2012 R2. I've setup credentails delegation using these options: Host * GSSAPIAuthentication yes GSSAPIDelegateCredentials yes GSSAPITrustDns yes For both client/server but no luck. I've read online that I need to run... (2 Replies)
Discussion started by: Devyn
2 Replies

9. Solaris

Authenticating UNIX (Solaris 11) to Windows 2012R2 / Active Directory

Gentleman, i am trying to setup Authentication for my Solaris 11 Server through Active Directory (Server 2012 R2). At least some things are already working, for example a getent passwd mydomainuser and ldapsearch command comes back with a correct result. So not everything i did was wrong. ... (1 Reply)
Discussion started by: bahnhasser83
1 Replies
DACSCRED(1)						       DACS Commands Manual						       DACSCRED(1)

NAME
dacscred - acquire and manage DACS credentials SYNOPSIS
dacscred [-dd dir] [-ll log_level] [-v] op [opargs] DESCRIPTION
This program is part of the DACS suite. The dacscred utility supports simple DACS authentication, optionally storing the returned DACS identities securely for future use by non-browser applications. Basic maintenance operations are provided for this cache of credentials. DACS per-user information, including the cache, is kept within a directory that must be owned by the user. Additionally, the directory must be accessible only by the user. DACS will refuse to use any per-user information if file permissions are inappropriate. If this directory is not specified on the command line, the following is the default behaviour. If an environment variable named DACSDIR is available, its value is used for the name of this directory; otherwise, DACS will use a directory named .dacs in the user's home directory. The contents of the cache file are encrypted. A password must be provided when the cache is created and before each subsequent access. Currently, AES-128-CFB is used along with a SHA1-based HMAC[1]. Security A jurisdiction may reject credentials that are used from an IP address that does not match the IP address from which the credentials were initially requested (see the VERIFY_IP configuration directive). This means that if a cache is moved to a different host, the credentials may be treated as invalid if they are used from that host. OPTIONS
The following command line flags are common to all operations: -dd directory The DACS directory to use instead of the default is directory. -ll log_level Set the debugging output level to log_level (see dacs(1)[2]). The default level is warn. -v The -v flag bumps the debugging output level to debug or (if repeated) trace. The op argument specifies the operation to be performed. The following operations are available: Try to authenticate as username by invoking dacs_authenticate[3] at the URL auth-URL. username has the syntax [[federation]::]jurisdiction:username (the jurisdiction component of the name must be provided; see dacs(1)[4]). An SSL connection is always used for this purpose. If authentication is successful and the -s flag is not given, the (username, auth-URL) pair will be recorded; subsequent invocations of the command can omit the auth-URL argument if it is unchanged. If the -p flag is given, the user is prompted for a password to pass to dacs_authenticate; if -pf is given instead, a password is read from file (stdin is read if file is "-"). If aux is given, it is used as the value of the AUXILIARY argument to dacs_authenticate. The -caf (-ccf) flag identifies file as a file of CA certificates (client certificates) in PEM format, respectively; see sslclient(1)[5]. New credentials replace old credentials in the cache. Credentials and authentication mappings in the cache are not automatically managed, so the cache may contain credentials that have expired. The following example prompts the user for a password before trying to authenticate as DSS:smith: % dacscred auth -p DSS:smith https://dss.example.com/cgi-bin/dacs/dacs_authenticate The following example might be used within a script to test if $passwd is the correct password for DSS:smith: % echo $passwd | dacscred auth -s -pf - DSS:smith https://dss.example.com/cgi-bin/dacs/dacs_authenticate The exit status will be 0 only if the password is correct. Delete all credentials with a name that matches a regular expression (see regex(3)[6]). Print all credentials to stdout that should be sent along with a service request to the given URL. If no URL is given, print all credentials in the cache. Note that these credentials represent DACS identities and should be kept secret. List the names of all credentials in the cache, by default. This is equivalent to providing the cred argument. If the auth argument is given, a list of identities and the auth-URL arguments that were used to authenticate those identities is displayed. If a regex is given, the list is limited to those identities matched by it (cred behaviour) or those "username auth-URL" strings that match it (auth behaviour). Change the password that protects the cache. The current password must first be provided. DIAGNOSTICS
The program exits 0 if everything was fine, 1 if an error occurred. BUGS
This command only supplies partial support for interacting with dacs_authenticate. SEE ALSO
dacs_authenticate(8)[3] AUTHOR
Distributed Systems Software (www.dss.ca[7]) COPYING
Copyright2003-2012 Distributed Systems Software. See the LICENSE[8] file that accompanies the distribution for licensing information. NOTES
1. HMAC http://www.rfc-editor.org/rfc/rfc2104.txt 2. dacs(1) http://dacs.dss.ca/man/dacs.1.html 3. dacs_authenticate http://dacs.dss.ca/man/dacs_authenticate.8.html 4. dacs(1) http://dacs.dss.ca/man/dacs.1.html#naming 5. sslclient(1) http://dacs.dss.ca/man/sslclient.1.html 6. regex(3) http://www.freebsd.org/cgi/man.cgi?query=regex&apropos=0&sektion=3&manpath=FreeBSD+9.0-RELEASE&format=html 7. www.dss.ca http://www.dss.ca 8. LICENSE http://dacs.dss.ca/man/../misc/LICENSE DACS 1.4.27b 10/22/2012 DACSCRED(1)
All times are GMT -4. The time now is 02:14 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy