07-15-2016
Instructions for Solaris 10 RedHat RHEL7 IPA for LDAP authentication?
Hi, does anyone have instructions on how to connect a Solaris 10 (Sparc) machine to Redhat RHEL7 IPA server for LDAP authentication, I have gone through the usual search results on Google, but nothing is working so far, but to be fair, not sure which source is the best and have NOT rewound everything to clean-state before trying the various sources.
If you used one of these, please advise which worked for you to focus on first in a clean-state sequence.
ConfiguringUnixClients - FreeIPA
FreeIPAv1:ConfiguringSolarisClients - FreeIPA
Bug 815515 – RFE: Update the DUA profile included in IPA - DUA config profile.
Bug 815533 – RFE: Update the Solaris 10 client documentation
https://www.centos.org/docs/5/pdf/ei...tion_Guide.pdf
Yes, I know the sources are old, but I was hoping to integrate the pieces/parts into something workable. If you have your own custom doc, I would be happy to review, update and post to RedHat (who haven't exactly been that helpful in this sequence) if it works and re-post here.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello Everyone,
I have enabled LDAP authentication on my Web script by adding the list of valid users in /etc/apach2/default-server.conf. However, I now want to retrieve the username of the person that logs in. How can I do that? Is there any such module?
Regards,
Harsha (0 Replies)
Discussion started by: garric
0 Replies
2. Linux
Hello,
I have a Linux box with RHEL4 running on it. The box is meant to be on the DMZ. There is a directory on the box that will be remotely from time to time and I want a form of authentication on it.
Presently, I have configured Basic authentication with apache but the security is not tight.
I... (1 Reply)
Discussion started by: bptronics
1 Replies
3. UNIX for Advanced & Expert Users
I see a lot of thread on LDAP Authentication but I want to enable LDAP Authentication with Authorization. Meaning, removing the user ID's and groups from the local servers and move them to an LDAP server. When a user logs in (via LDAP) they will be given their group memberships and access to the... (3 Replies)
Discussion started by: scottsl
3 Replies
4. Red Hat
I am trying to convert all my redhat servers over to ldap. I have solved almost all the probems but am having trouble getting cvs pserver to authenticate. I'm running redhat 4. Just patched everything the other day.
cvs is cvs-1.11.17-9.1.el4_7.1. Any suggestions would be welcome.
Obviously... (1 Reply)
Discussion started by: jhtrice
1 Replies
5. Solaris
Hi folks,
i have opends 1.2 manually installed
subversion 1.4.3 and apache2 updated by package manager.
i want to access svn using LDAP authentication
its giving an error:
ldap_simple_bind_s() failed.
what could be the problem.
i wrote some text at the end of httpd.conf fpr ldap... (2 Replies)
Discussion started by: visu_buri
2 Replies
6. Solaris
Dear Friends,
I have recently installed iplanet directory server on my Solaris 10 machine.I was able to successfully install and configure ldap on my system.Furthermore, was also able to add
user entries to the LDAP database server.But now I am finding it difficult to authenticate LDAP users... (1 Reply)
Discussion started by: raunaqnilekani
1 Replies
7. AIX
Hi, We are trying to use LDAP to authenticate the login from our application. Our application is installed on AIX 6.1 and LDAP server is on active directory windows 2003.
We are getting the below error when we try to login. We have the required lib file in the path it is looking for. Any idea... (3 Replies)
Discussion started by: Nand1010_MA
3 Replies
8. Red Hat
I got a ldap server using ldap sun one product. I need to connect and sync a redhat machine with it, any ideas on best way to do it? I edited the ldap.conf file in /etc/openldap/ but no joy yet :) (1 Reply)
Discussion started by: da2013
1 Replies
9. Solaris
Hi
We have IPA v3 setup on a Red Hat RHEL6 server and are trying to interface our Solaris servers to it.
There is a slight complication in that we are using krb5 for authentication and IPA as a user and access repository (not sure if that makes a difference). The problem is that we cannot get... (4 Replies)
Discussion started by: gregsih
4 Replies
10. Red Hat
Hi, I come from a legacy Solaris background with lots of experience with Solaris Containers/zones that we use for network and process isolation from each other.
Currently we have a RHEL7 Linux VM running on VMWare, but we would like to segment that VM with some form of containers and achieve... (1 Reply)
Discussion started by: ckmehta
1 Replies
LEARN ABOUT CENTOS
ipa-rmkeytab
ipa-rmkeytab(1) IPA Manual Pages ipa-rmkeytab(1)
NAME
ipa-rmkeytab - Remove a kerberos principal from a keytab
SYNOPSIS
ipa-rmkeytab [ -p principal-name ] [ -k keytab-file ] [ -r realm ] [ -d ]
DESCRIPTION
Removes a kerberos principal from a keytab.
Kerberos keytabs are used for services (like sshd) to perform kerberos authentication. A keytab is a file with one or more secrets (or
keys) for a kerberos principal.
A kerberos service principal is a kerberos identity that can be used for authentication. Service principals contain the name of the ser-
vice, the hostname of the server, and the realm name.
ipa-rmkeytab provides two ways to remove principals. A specific principal can be removed or all principals for a given realm can be
removed.
All encryption types and versions of a principal are removed.
The realm may be included when removing a specific principal but it is not required.
NOTE: removing a principal from the keytab does not affect the Kerberos principal stored in the IPA server. It merely removes the entry
from the local keytab.
OPTIONS
-p principal-name
The non-realm part of the full principal name.
-k keytab-file
The keytab file to append the principal(s) from.
-r realm
A realm to remove all principals for.
-d Debug mode. Additional information is displayed.
EXAMPLES
Remove the NFS service principal on the host foo.example.com from /tmp/nfs.keytab.
# ipa-rmkeytab -p nfs/foo.example.com -k /tmp/nfs.keytab
Remove the ldap service principal on the host foo.example.com from /etc/krb5.keytab.
# ipa-rmkeytab -p ldap/foo.example.com -k /etc/krb5.keytab
Remove all principals for the realm EXAMPLE.COM.
# ipa-rmkeytab -r EXAMPLE.COM -k /etc/krb5.keytab
EXIT STATUS
The exit status is 0 on success, nonzero on error.
1 Kerberos initialization failed
2 Memory allocation error
3 Unable to open keytab
4 Unable to parse the principal name
5 Principal name or realm not found in keytab
6 Unable to remove principal from keytab
IPA
Oct 30 2009 ipa-rmkeytab(1)