Jonathan Schreiter wrote:
I should have probably provided more detail. I followed the HOWTO:kerberos and entered
the config - sasl - mapping as it explained, namely:
If you don't need the DOMAIN part, you can omit the second set of
parentheses and just have
Do your users have a DN of uid=jdoe,dc=myexample,dc=com or
uid=jdoe,ou=People,dc=myexample,dc=com? If the latter, then this won't
work. You'll have to use
This is good if you are sure that all of your users' entries are under
ou=People and have a uid that matches the principal name.
Or, just use
And that poduces the same SASL GSSAPI errors as in the last post.
The link on that HOWTO that points to the SASL configurations shows the other configuraton
paramaters (the ones that I also tried and posted in my last message). The install isa
standard user(a)mydomain.com so you're probably correct and I've canged that entry
to the above settings.
The SASL documenation:
Configuring SASL Identity Mapping from the Console
In the Console, open the Directory Server.
Open the "Configuration" tab.
Select the "SASL Mapping" tab.
To add new SASL identities, select the "Add" button, and fill in the required
The Kerberos HOWTO doesn't discuss adding any mappings on the console, so it
wasn't clear if this was required or not. Can you confirm?
If you've added
the above entry using ldapmodify or by editing dse.ldif,
then you do not have to add it with the console - although it is a good
idea to use the console to add this configuration unless you really know
what you're doing, because you'll have to add the cn=mapping entry
parent before the cn=mapname child config entry.
If it is required, what would the fields be filled with - do we need
to link to the dn: cn=mapname,cn=mapping,cn=sasl,cn=config above?
I'm not sure what you mean.
Also, because the service principal that FDS is going to use is
, do I need to add a second dn in order for this to
No, not unless FDS is going to use it's service principal to do a
SASL/GSSAPI BIND to another FDS.
> Also, I'm not sure if I need all the settings (such as a sasl_auth_id) but they
are left over from configuration of openldap.
The SASL settings that openldap used (they aren't mentioned in the howto: kerberos or
SASL on the FDS sites), but they are:
I've tried with and without these settings and I still get the the error: invalid
credentials (49) additional info: SASL(-1): generic failure: GSSAPI Error: Miscellaneous
failure (Permission denied). When I set these, I beleve it is used for default settings
(such as you don't have to type ldapwhoami -Y GSSAPI, just ldapwhoami).
Ok. Those are client side settings that do not affect Fedora DS.
Any thoughts would be appreciated!
Many thanks again,
Fedora-directory-users mailing list