Groups | Search | Server Info | Login | Register


Groups > comp.protocols.kerberos

comp.protocols.kerberos

5375 articles (numbers 76 – 5481) — threaded view

| Advanced

Subject Author Date [desc]
Re: macOS API ccache, kinit for multiple principals gives internal credentials cache error "A. Karl Kornel" <karl@kornel.us> 2025-02-18 13:39 -0800
Re: macOS API ccache, kinit for multiple principals gives internal credentials cache error "A. Karl Kornel" <karl@kornel.us> 2025-02-18 11:05 -0800
Re: macOS API ccache, kinit for multiple principals gives internal credentials cache error "A. Karl Kornel" <karl@kornel.us> 2025-02-17 15:18 -0800
macOS API ccache, kinit for multiple principals gives internal credentials cache error "A. Karl Kornel" <karl@kornel.us> 2025-02-12 15:35 -0800
Re: kadm5.acl "e" permission Stefan Kania <stefan@kania-online.de> 2025-02-07 19:07 +0100
Re: kadm5.acl "e" permission "Greg Hudson" <ghudson@mit.edu> 2025-02-07 11:07 -0500
kadm5.acl "e" permission Stefan Kania <stefan@kania-online.de> 2025-02-07 14:58 +0100
Re: Restoring DB to alternate LDAP suffix "Greg Hudson" <ghudson@mit.edu> 2025-01-30 00:33 -0500
Re: Restoring DB to alternate LDAP suffix Jake Scott <jake@poptart.org> 2025-01-29 21:57 -0500
Re: Restoring DB to alternate LDAP suffix "Greg Hudson" <ghudson@mit.edu> 2025-01-29 15:25 -0500
Restoring DB to alternate LDAP suffix Jake Scott <jake@poptart.org> 2025-01-29 12:00 -0500
Re: Issue with Kerberos authentication using API / MSLSA ccache type Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-11-23 13:51 -0500
Issue with Kerberos authentication using API / MSLSA ccache type Samir Sayyed <ssayyed@us.ibm.com> 2024-11-21 09:46 +0000
Re: Inquiry Regarding CVE-2024-26461 Fix in Upcoming krb5 Release "Greg Hudson" <ghudson@mit.edu> 2024-11-08 12:18 -0500
Inquiry Regarding CVE-2024-26461 Fix in Upcoming krb5 Release "Zhang, Shawn" <Shawn.Zhang@Dell.com> 2024-11-08 06:43 +0000
Re: Subject: Assistance Needed with OTP Plugin Development "Cervantes Wu (Lum)" <cwlum@sloan.mit.edu> 2024-11-06 01:07 +0800
Subject: Assistance Needed with OTP Plugin Development TheBest Rodger <d.kalikin2013@gmail.com> 2024-11-05 17:32 +0300
Mold Removal in Mississauga: Safeguarding Your Home and Health John Kitty <digiseoservice@gmail.com> 2024-10-10 15:48 +0700
Re: Why do "strict acceptor checking"? Russ Allbery <eagle@eyrie.org> 2024-10-08 18:19 -0700
Re: Why do "strict acceptor checking"? Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-10-08 20:33 -0400
KDC server enter a state that require pa_type=spake Jim Shi <hjshi@yahoo.com> 2024-10-08 22:04 +0000
Re: Why do "strict acceptor checking"? Jeffrey Hutzelman <jhutz@cmu.edu> 2024-10-08 13:20 -0400
Re: Why do "strict acceptor checking"? Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-10-08 12:05 -0400
Re: Why do "strict acceptor checking"? Simo Sorce <simo@redhat.com> 2024-10-08 10:04 -0400
Re: Why do "strict acceptor checking"? Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-10-08 09:42 -0400
Re: Why do "strict acceptor checking"? "Roland C. Dowdeswell" <elric@imrryr.org> 2024-10-08 10:50 +0100
Why do "strict acceptor checking"? Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-10-07 20:23 -0400
Shell start script for krb5kdc/kadmind with prompt for K/M passphrase from console or pkcs15 token via Opensc Stefan Hartmann <stefanh@hafenthal.de> 2024-09-16 18:51 +0200
Re: is there a way to detect if user is using same incorrect password in authentication Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-08-10 12:28 -0400
Re: is there a way to detect if user is using same incorrect password in authentication Brent Kimberley <Brent.Kimberley@Durham.ca> 2024-08-10 11:33 +0000
Re: is there a way to detect if user is using same incorrect password in authentication Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-08-09 21:03 -0400
Re: is there a way to detect if user is using same incorrect password in authentication Brent Kimberley <Brent.Kimberley@Durham.ca> 2024-08-09 21:47 +0000
is there a way to detect if user is using same incorrect password in authentication Jim Shi <hjshi@yahoo.com> 2024-08-09 21:36 +0000
Re: Kerberos TCP retries Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-08-04 12:52 -0400
Kerberos TCP retries Dejmek Pavel <pavel.dejmek@o2.cz> 2024-08-04 12:45 +0000
Re: one time password integration Charles Hedrick <hedrick@rutgers.edu> 2024-07-31 21:14 +0000
Re: one time password integration Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-07-31 16:38 -0400
Re: one time password integration Charles Hedrick <hedrick@rutgers.edu> 2024-07-31 20:25 +0000
Re: one time password integration Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-07-31 15:44 -0400
Re: one time password integration "Greg Hudson" <ghudson@mit.edu> 2024-07-31 15:28 -0400
one time password integration Charles Hedrick <hedrick@rutgers.edu> 2024-07-31 18:22 +0000
Re: recent certificate failure for pkinit Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-07-08 21:29 -0400
Re: recent certificate failure for pkinit Carson Gaspar <carson@taltos.org> 2024-07-08 17:52 -0400
recent certificate failure for pkinit Matt Zagrabelny <mzagrabe@d.umn.edu> 2024-07-08 13:54 -0500
Re: honoring the TRUSTED_FOR_DELEGATION KDC MS-SFU Kerberos Protocol Extensions flag? James Ralston <ralston@pobox.com> 2024-06-27 02:19 -0400
krb5-1.21.3 is released "Greg Hudson" <ghudson@mit.edu> 2024-06-26 18:15 -0400
Re: Error - sudo: account validation failure, is your account locked? Andrej Mikus <a-krb5user@mikus.sk> 2024-06-05 18:20 +0200
Re: Error - sudo: account validation failure, is your account locked? Dan Mahoney <danm@prime.gushi.org> 2024-06-05 01:04 -0400
Re: How to get Kerberos token for proxy authentication Simo Sorce <simo@redhat.com> 2024-06-04 15:15 -0400
Re: How to get Kerberos token for proxy authentication Ken Hornstein <kenh@cmf.nrl.navy.mil> 2024-06-04 12:43 -0400

« Previous 1 2 3 4 5 ... 108 Next »


csiph-web