Mac OS X 10.5: Accessing a resource using NTLM security requires authentication
In Mac OS X 10.5, when bound to Microsoft Active Directory and accessing a network-based resource that requires NTLM authentication, clients are prompted to enter their username and password.
Hello
I have a shell script, which should send email, if any error occurred. This script is running in Red Hat Linux 4.6, and want to configure postfix so it can relay to an Exchange Server.
The Authorization method of Exchange server, I guess is: 250-AUTH NTLM. So I have:
Server A ( Red... (1 Reply)
Hello,
I tried searching through lot of threads for a solution but couldn't fetch the exact solution, so I am creating a new thread.
I am trying to connect to a FTP server
1) using a simple FTP command, it gives the error :
534 Policy requires SSL.
Login failed.
2) using SFTP... (19 Replies)
I have defined the connectivity details to the oracle database in a file env.ksh as follows
DBNAME=$INST_NAME
USERID="use_x"
PASSWORD="cccccc"
When ever i want to connect to the database from a shellscript ,i am running this file from the shell script as follows
# Export the... (1 Reply)
dsconfigldap(1) BSD General Commands Manual dsconfigldap(1)NAME
dsconfigldap -- LDAP server configuration/binding add/remove tool.
SYNOPSIS
dsconfigldap [-fvixsgmeSN] -a servername [-n configname] [-c computerid] [-u username] [-p password] [-l username] [-q password]
dsconfigldap [-fviSN] -r servername [-u username] [-p password] [-l username] [-q password]
options:
-f force authenticated binding/unbinding
-v verbose logging to stdout
-i prompt for passwords as required
-x choose SSL connection
-s enforce secure authentication only
-g enforce packet signing security policy
-m enforce man-in-middle security policy
-e enforce encryption security policy
-S do not update search policies
-N do not prompt about adding certificates
-h display usage statement
-a servername add config of servername
-r servername remove config of servername
-n configname name given to LDAP server config
-c computerid name used if binding to directory
-u username privileged network username
-p password privileged network user password
-l username local admin username
-q password local admin password
DESCRIPTION
dsconfigldap allows addition or removal of LDAP server configurations. Presented below is a discussion of possible parameters. Usage has
three intents: add server config, remove server config, or display help.
Options list and their descriptions:
-f Bindings will be established or dropped in conjunction with the addition or removal of the LDAP server configuration.
-v This enables the logging to stdout of the details of the operations. This can be redirected to a file.
-i You will be prompted for a password to use in conjunction with a specified username.
-s This ensures that no clear text passwords will be sent to the LDAP server during authentication. This will only be enabled if the
server supports non-cleartext methods.
-e This ensures that if the server is capable of supporting encryption methods (i.e., SSL or Kerberos) that encryption will be enforced
at all times via policy.
-m This ensures that man-in-the-middle capabilities will be enforced via Kerberos, if the server supports the capability.
-g This ensures that packet signing capabilities will be enforced via Kerberos, if the server supports the capability.
-x Connection to the LDAP server will only be made over SSL.
-S Will skip updating the search policies.
-N Will assume Yes for installing certificates
-h Display usage statement.
-a servername
This is either the fully qualified domain name or correct IP address of the LDAP server to be added to the DirectoryService LDAPv3
configuration.
-r servername
This is either the fully qualified domain name or correct IP address of the LDAP server to be removed from the DirectoryService
LDAPv3 configuration.
-n configname
This is the UI configuration label that is to be given the LDAP server configuration.
-c computerid
This is the name to be used for directory binding to the LDAP server. If none is given the first substring, before a period, of the
hostname (the defined environment variable "HOST") is used.
-u username
Username of a privileged network user to be used in authenticated directory binding.
-p password
Password for the privileged network user. This is a less secure method of providing a password, as it may be viewed via process
list. For stronger security leave the option off and you will be prompted for a password.
-l username
Username of a local administrator.
-q password
Password for the local administrator. This is a less secure method of providing a password, as it may be viewed via process list.
For stronger security leave the option off and you will be prompted for a password.
EXAMPLES
dsconfigldap -a ldap.company.com
The LDAP server config for the LDAP server myldap.company.com will be added. If authenticated directory binding is required by the LDAP
server, then this call will fail. Otherwise, the following parameters configname, computerid, and local admin name will respectively pick up
these defaults: ip address of the LDAP servername, substring up to first period of fully qualified hostname, and username of the user in the
shell this tool was invoked.
dsconfigldap -r ldap.company.com
The LDAP server config for the LDAP server myldap.company.com will be removed but not unbound since no network user credentials were sup-
plied. The local admin name will be the username of the user in the shell this tool was invoked.
SEE ALSO opendirectoryd(8), odutil(1)Mac OS April 24 2010 Mac OS