[37194] in Kerberos

home help back first fref pref prev next nref lref last post

RE: Best practices storing multiple principals with the same LDAP

daemon@ATHENA.MIT.EDU (Luca Rea)
Fri Aug 21 09:50:06 2015

From: Luca Rea <luca.rea@contactlab.com>
To: Cory Albrecht <cory@albrecht.name>, "kerberos@mit.edu" <kerberos@mit.edu>
Date: Fri, 21 Aug 2015 13:49:40 +0000
Message-ID: <954D23549BF60D4488191378EE57420B8B3B537D@BEAR.tomatowin.local>
In-Reply-To: <CAMW5rYL8M260PD2dH+tYOz_dhK2gEi78NE3AgV1QAtoaiA8rtA@mail.gmail.com>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

I suppose should be enough two simple steps:

- run "addprinc -x linkdn=... "
- add the secondary cn/uid to the existent ldap user

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post