[29935] in Kerberos
Principal attributes and policy in LDAP Realm
daemon@ATHENA.MIT.EDU (Klaus Heinrich Kiwi)
Fri Jun 6 16:18:02 2008
From: Klaus Heinrich Kiwi <klausk@linux.vnet.ibm.com>
To: kerberos@mit.edu
Date: Fri, 06 Jun 2008 17:16:07 -0300
Message-Id: <1212783367.27162.15.camel@klausk.br.ibm.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu
Hi,
I hav some questions regarding how data is organized when using the
LDAP KDB plugin for a realm. I hope this is the right place to ask.
I have a Realm set-up using the LDAP backend. First thing is: when
querying a principal using kadmin, why attributes such as 'Last
[successful,failed] authentication' and 'Failed password attempts' are
never filled-up? After failing some authentication attempts I have the
following:
...
Last modified: Fri Jun 06 16:24:09 BRT 2008 (klaus/admin@MYREALM)
Last successful authentication: [never]
Last failed authentication: [never]
Failed password attempts: 0
...
Also, where in the LDAP database is the 'last modified' attribute
placed?
Thanks,
-K
--
Klaus Heinrich Kiwi <klausk@linux.vnet.ibm.com>
Linux Security Development, IBM Linux Technology Center
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos