We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cloned from Pagure issue: https://pagure.io/389-ds-base/issue/50018
During gssapi authentication, the principal is hardcoded ldap/@ that is limited. An improvement is to retrieve the principal from the keytab.
It should select the appropriate principal from the keytab.
For privilege separation access to the keytab via gssproxy would be better
RFE
No bug. deploy ipa replica/server will setup a test env
NA
Authentication with different principal than ldap/@
The text was updated successfully, but these errors were encountered:
Comment from mreynolds (@mreynolds389) at 2018-11-15 17:58:48
Metadata Update from @mreynolds389:
Sorry, something went wrong.
Comment from mreynolds (@mreynolds389) at 2020-02-26 16:58:58
Comment from tbordaz (@tbordaz) at 2020-04-22 16:43:58
#658
Comment from mreynolds (@mreynolds389) at 2020-07-21 18:13:30
Issue linked to Bugzilla: Bug 1859297
No branches or pull requests
Cloned from Pagure issue: https://pagure.io/389-ds-base/issue/50018
Issue Description
During gssapi authentication, the principal is hardcoded ldap/@ that is limited. An improvement is to retrieve the principal from the keytab.
It should select the appropriate principal from the keytab.
For privilege separation access to the keytab via gssproxy would be better
Package Version and Platform
RFE
Steps to reproduce
No bug. deploy ipa replica/server will setup a test env
Actual results
NA
Expected results
Authentication with different principal than ldap/@
The text was updated successfully, but these errors were encountered: