473,386 Members | 1,752 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

authenticate Linux against active directory with pw policy

Shenno
59
i just need yes or no, can i authenticate Linux boxes from windows active directory DC with password aging, complexity policy applied from active directory ?

thanks in advance .
Jun 5 '13 #1
4 1811
sicarie
4,677 Expert Mod 4TB
Yes, the easiest way to do this is to through OpenLDAP and Kerberos. There are several other methods through which to do this, however, including proxying OpenLDAP, or other similar utilities.

OpenLDAP+Kerberos is probably the one that has the most guides out there.
Jun 27 '13 #2
Shenno
59
actually i meant MS active directory , not openldap..

also i have tested MS AD password policy, and i was shocked it's working on linux boxes !

thanks anyways.
Jun 27 '13 #3
sicarie
4,677 Expert Mod 4TB
When working with AD and Linux I personally have found the easiest method is to duplicate the AD domain in OpenLDAP, and have that work with the Linux hosts. Then the OpenLDAP can sync with AD, that doesn't mean it's the best or only way - just what I've found to be easiest and most documented when I run into issues.

There are several other ways to do this, and it's great to hear you were able to figure it out! Can you post what method you used to help anyone else who runs into this and doesn't want to use OpenLDAP? (And Windows server version, etc...?)
Jun 27 '13 #4
Shenno
59
consider the following

AD FQDN : master.dc.alone , domain is : dc.alone

1st configure linux box to use AD as NTP server (must)

2nd use system-config-authentication cmd and configure it exactly as following image (case sensitive)
http://ormanschools.com/temp/xx.gif

3rd click join domain and provide domain admin credential.

then you are done :)

GL.
Jun 27 '13 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

5
by: Bud | last post by:
I would like to be able to pass a request to IIS to have a user name and password authenticated against my Active Directory Users database. I'm running Server 2003 however my web pages are build...
2
by: Ted Vreeland via DotNetMonster.com | last post by:
Hi Folks, I've got a intranet ASP.NET page that takes a user id (e.g. 'DoeJ') passed in and attempts to get the First and Last name of the user from the Active Directory. I'm running into some...
3
by: Marc Eggenberger | last post by:
Hi there. I have the following environment: Active Directory running on Windows 2000. There is a root domain called ad.sys and within this root domain there are the following subdomains: ...
3
by: Caspy | last post by:
I just get stuck on how to check if a user is a member of network (domain). I am building an internal tracking system with ASP.Net with Form authentication. When an user is added into the system,...
0
by: B111Gates | last post by:
OK I know this is a complex question so I will break it up. I know that SSPI is the prefered method of authentication, however if I use the sample provide by MS I cannot authenticate across...
1
by: Raghu | last post by:
I have following code that validates a given user credentails against a active directory. The login part works but I can not search as it fails to return the record. Does any one have any idea...
1
by: fomalhaut | last post by:
Hi All, I'm builing an application that requires domain admin access to run, and I'm trying to allow for the application to be run as a normal user and allow the user to provide it with a...
1
AnuSumesh
by: AnuSumesh | last post by:
Hi All, I want to authenticate the login user aginst active directory. I am using ASP. I have tried using LDAP object. in vbs file it is working fine but in my asp page it is not working. What...
2
by: LIKKLE MAN | last post by:
Can anyone point me to an article that explains how to get an instance of DB2 running on AIX 5.x authenticating against an Active Directory server. There is no issue securing AIX itself in this...
0
JustRun
by: JustRun | last post by:
Hi, I'm developing a windows application using VC#, I need to authenticate user throught their credentials in the Active Dirctory, I try to let the login form "user name" take automaticaly the...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.