Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
Joe Martin
OpenLDAP
Commits
ae6ef32c
Commit
ae6ef32c
authored
Dec 12, 2010
by
Quanah Gibson-Mount
Browse files
KERBEROS has not been a valid password scheme since 2004...
Actually, slapd has supported sasl_setpass for many years...
parent
bbdfe3a1
Changes
1
Hide whitespace changes
Inline
Side-by-side
doc/guide/admin/security.sdf
View file @
ae6ef32c
...
...
@@ -274,19 +274,6 @@ verification to another process. See below for more information.
Note: This is not the same as using SASL to authenticate the LDAP
session.
H3: KERBEROS password storage scheme
This is not really a password storage scheme at all. It uses the
value of the {{userPassword}} attribute to delegate password
verification to Kerberos.
Note: This is not the same as using Kerberos authentication of
the LDAP session.
This scheme could be said to defeat the advantages of Kerberos by
causing the Kerberos password to be exposed to the {{slapd}} server
(and possibly on the network as well).
H2: Pass-Through authentication
Since OpenLDAP 2.0 {{slapd}} has had the ability to delegate password
...
...
@@ -316,9 +303,6 @@ mechanism and are used to identify the account whose password is to be
verified. This allows arbitrary mapping between entries in OpenLDAP
and accounts known to the backend authentication service.
Note: There is no support for changing passwords in the backend
via {{slapd}}.
It would be wise to use access control to prevent users from changing
their passwords through LDAP where they have pass-through authentication
enabled.
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment