This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Pages: [1]
1
Installation and Upgrades / Re: /etc/zentyal/hooks/users.postsetconf
« on: August 04, 2014, 08:49:55 pm »
this case not really.
2
Installation and Upgrades / Re: /etc/zentyal/hooks/users.postsetconf
« on: August 04, 2014, 04:47:13 pm »
you can pass more details than you want?
3
Installation and Upgrades / Re: HTTP Proxy AD
« on: July 25, 2014, 08:22:42 pm »
I fixed the problem by adding the / etc/krb5.conf the parameters:
[realms]
Domain.local = {
kdc = srv-dc01.domain.local
admin_server = srv-dc01.domain.local
default_domain = domain.local
}
[domain_realm]
. = domain.local domain.local
= domain.local domain.local
Like / etc/krb5.conf is recreated every time the service is started or restarted I created the script / etc / Zentyal / hooks / users.preservice with the following content:
echo "" >> / etc/krb5.conf
echo "[realms]" >> / etc/krb5.conf
echo "domain.local = {" >> / etc/krb5.conf
echo "kdc = srv-dc01.domain.local" >> / etc/krb5.conf
echo "admin_server = srv-dc01.domain.local" >> / etc/krb5.conf
echo "default_domain = domain.local" >> / etc/krb5.conf
echo "}" >> / etc/krb5.conf
echo "" >> / etc/krb5.conf
echo "[domain_realm]" >> / etc/krb5.conf
echo ". domain.local domain.local =" >> / etc/krb5.conf
echo "domain.local domain.local =" >> / etc/krb5.conf
[realms]
Domain.local = {
kdc = srv-dc01.domain.local
admin_server = srv-dc01.domain.local
default_domain = domain.local
}
[domain_realm]
. = domain.local domain.local
= domain.local domain.local
Like / etc/krb5.conf is recreated every time the service is started or restarted I created the script / etc / Zentyal / hooks / users.preservice with the following content:
echo "" >> / etc/krb5.conf
echo "[realms]" >> / etc/krb5.conf
echo "domain.local = {" >> / etc/krb5.conf
echo "kdc = srv-dc01.domain.local" >> / etc/krb5.conf
echo "admin_server = srv-dc01.domain.local" >> / etc/krb5.conf
echo "default_domain = domain.local" >> / etc/krb5.conf
echo "}" >> / etc/krb5.conf
echo "" >> / etc/krb5.conf
echo "[domain_realm]" >> / etc/krb5.conf
echo ". domain.local domain.local =" >> / etc/krb5.conf
echo "domain.local domain.local =" >> / etc/krb5.conf
4
Installation and Upgrades / Re: HTTP Proxy AD
« on: July 23, 2014, 09:12:01 pm »
This is the log erro of zentyal.log when i tried access the proxy menu interface "rules"
2014/07/23 16:10:11 DEBUG> ExternalAD.pm:195 EBox::LDAP::ExternalAD::connectWithKerberos - Não é possivél obter o ticket Kerberos para se ligar ao LDAP: could not acquire credentials using an initial credentials context: Preauthentication failed
2014/07/23 16:10:11 ERROR> Base.pm:207 EBox::CGI::Base::_print - Error printing method section _body
But i can access internet via browser with authentication
2014/07/23 16:10:11 DEBUG> ExternalAD.pm:195 EBox::LDAP::ExternalAD::connectWithKerberos - Não é possivél obter o ticket Kerberos para se ligar ao LDAP: could not acquire credentials using an initial credentials context: Preauthentication failed
2014/07/23 16:10:11 ERROR> Base.pm:207 EBox::CGI::Base::_print - Error printing method section _body
But i can access internet via browser with authentication
5
Installation and Upgrades / Re: HTTP Proxy AD
« on: July 23, 2014, 08:17:15 pm »
If I restart the module users the error does not occur.
if I delete the computer and restart the squid ad he creates new computer arrives operating normally for a period but then days later the problem occurs again.
if I delete the computer and restart the squid ad he creates new computer arrives operating normally for a period but then days later the problem occurs again.
6
Installation and Upgrades / Re: HTTP Proxy AD
« on: July 22, 2014, 02:32:14 pm »
Yes, the account is active.
7
Installation and Upgrades / Re: HTTP Proxy AD
« on: July 21, 2014, 10:23:46 pm »
Hi,
Yes, the clock is sincronied.
The account exists in OU Computers.
Yes, the clock is sincronied.
The account exists in OU Computers.
8
Installation and Upgrades / Re: HTTP Proxy AD
« on: July 21, 2014, 04:30:22 pm »
has anyone ever experienced this situation?
9
Installation and Upgrades / Re: Zentyal 3.2 - Kerberos Problem Help! [SOLVED]
« on: May 21, 2014, 10:26:26 pm »
I have this same problem. How did you do this procedure?
10
Installation and Upgrades / Re: Error - Unable to get kerberos ticket to bind to LDAP
« on: May 21, 2014, 10:26:07 pm »
I have this same problem. How did you do this procedure?
11
Portuguese / Erro proxy HTTP AD
« on: April 29, 2014, 04:52:35 pm »
Pessoal,
Possuo a versão 3.4.2 com o proxy integrado ao AD 2008 R2 via ldap. Funcionando normalmente até uma atualização efetuada do zentyal onde agora ao tentar acessar as regras de proxy pela interface ocorre o erro:
Não é possivél obter o ticket Kerberos para se ligar ao LDAP: could not acquire credentials using an initial credentials context: Preauthentication failed
É possível recriar esta credencial manualmente via linha de comando, alguém já passou por isto?
Obrigado.
Possuo a versão 3.4.2 com o proxy integrado ao AD 2008 R2 via ldap. Funcionando normalmente até uma atualização efetuada do zentyal onde agora ao tentar acessar as regras de proxy pela interface ocorre o erro:
Não é possivél obter o ticket Kerberos para se ligar ao LDAP: could not acquire credentials using an initial credentials context: Preauthentication failed
É possível recriar esta credencial manualmente via linha de comando, alguém já passou por isto?
Obrigado.
12
Installation and Upgrades / HTTP Proxy AD [SOLVED]
« on: April 29, 2014, 04:41:41 pm »
Version: 3.4.2
After an update of the Zentyal Proxy component is presenting problem. I have the same integrated with AD via LDAP, but the following message when trying to access the rules appear:
It is not possible to Obtain the Kerberos ticket to connect to LDAP: could not acquire credentials credentials using an initial context: preauthentication failed
There is possibility to generate this credential again without reinstalling anything?
Thanks,
After an update of the Zentyal Proxy component is presenting problem. I have the same integrated with AD via LDAP, but the following message when trying to access the rules appear:
It is not possible to Obtain the Kerberos ticket to connect to LDAP: could not acquire credentials credentials using an initial context: preauthentication failed
There is possibility to generate this credential again without reinstalling anything?
Thanks,
13
Installation and Upgrades / Zentyal losing default route
« on: April 28, 2014, 04:33:50 pm »
Hello,
I have the following environment:
1 LAN
3 WAN
All wans are coming in Zentyal with their gateways configured for the interface.
I can connect to the internet workstations, but by Zentyal can not access the internet even with a ping test.
I checked the default ip route table is empty and the same. Could anyone guide me?
Follows the table ip route:
Zentyal root @ :/ usr / local / sbin # ip route show table main
187.72.167.208/28 dev eth1 proto kernel scope link src 187.72.167.209
192.168.5.0/24 dev eth2 proto kernel scope link src 192.168.5.2
192.168.10.0/24 dev eth0 proto kernel scope link src 192.168.10.254
192.168.25.0/24 dev eth3 proto kernel scope link src 192.168.25.2
Zentyal root @ :/ usr / local / sbin # ip route show table default
I have enabled failover and link feature enabled Multigateway where a network object (some workstations) comes to the internet for a particular gateway.
Thanks!
Angelo
I have the following environment:
1 LAN
3 WAN
All wans are coming in Zentyal with their gateways configured for the interface.
I can connect to the internet workstations, but by Zentyal can not access the internet even with a ping test.
I checked the default ip route table is empty and the same. Could anyone guide me?
Follows the table ip route:
Zentyal root @ :/ usr / local / sbin # ip route show table main
187.72.167.208/28 dev eth1 proto kernel scope link src 187.72.167.209
192.168.5.0/24 dev eth2 proto kernel scope link src 192.168.5.2
192.168.10.0/24 dev eth0 proto kernel scope link src 192.168.10.254
192.168.25.0/24 dev eth3 proto kernel scope link src 192.168.25.2
Zentyal root @ :/ usr / local / sbin # ip route show table default
I have enabled failover and link feature enabled Multigateway where a network object (some workstations) comes to the internet for a particular gateway.
Thanks!
Angelo
Pages: [1]