Skip to content
Advertisement

Tag: ldap

Segmentation fault (core dumped) when calling LdapConnection.SendRequest(SearchRequest req) at System.DirectoryServices.Protocols on Ubuntu 18.04.4LTS

When I try to get user information from Active Directory, LdapConnection.SendRequest(SearchRequest req) causes : Segmentation fault (core dumped) on an Ubuntu 18.04.4 LTS (GNU/Linux 4.15.0-147-generic x86_64). If I remove the line searchRequest.TimeLimit = new TimeSpan(0, 1, 0); LdapPal.SearchDirectory method returns LdapError.TimeOut (-7). and throws : Below code works without any problem on a Windows. Verifying username and password by LdapConnection.Bind(new

Cx Oracle ‘TNS could not resolve the connect identifier’

I am connecting to an Oracle DB using LDAP and the Python cx_Oracle library. I have proper sqlnet.ora, ldap.ora and tnsnames.ora files. On my Windows machine everything works fine using the 12.1 Oracle client and the following Python code: I have installed the Oracle instant client 12.1 on my Linux machine (Debian) following the zip file installation method advised on

Windows AD and Its Key tab File

I just have a simple question . I have windows Active directory . I have created key tab file from it with command : Now as per my understanding this file consist of username along with its password in encrypted format. When I will try to authenticate with this keytab file, Request served by the file only or This will

Can’t install php7.2-ldap on Ubuntu 18.10 – “unmet dependencies”

Recently I’m working with Laravel and LDAP (Active directory) authentication. But I can’t install php7.2-ldap, I also tried to install in php7.3 but failed. Currently I’m using ubuntu v18.10 with multiple php version. I tried: $ sudo apt-get install php7.2-ldap and got this output I also tried $ sudo apt-get update and upgrade also before do it. Answer 7.2.20-1+ubuntu18.10.1+deb.sury.org+1 is

Deal with Squid Kerberos auth and Squidguard ldapusersearch

I’m meeting troubles with Squid Kerberos auth and the Squidguard ldapusersearch who I use to apply acl by Active Directory groups membership. The problem is : Squid and Squidguard see my user as : user@domain.local so the ‘%s’ variable of squidguard is ‘user@domain.local’ Into my ldap query there is no default property who can interpret this string. Example : And

SSSD and sudo: mismatch between sudoHost and server hostname

I’m running SSSD/LDAP on CentOS6 to authenticate users and I’ve configured it also to get SUDO information from the LDAP server. If I run hostname on my server I get: I configured sssd.conf with a search base, for example: Users who have SUDO rights on this machine have this kind of entry: Now, as you see there is a mismatch

Advertisement