authenticate   148

« earlier    

JWT to authenticate Servers API’s – codeburst
In simple terms, it is just another way of encoding JSON object and use that encoded object as access tokens for authentication from the server. alg: We have two main algorithms(HS256/RS256) to sign…
jwt  json-web-token  json  auth  oath  authenticate  javascript  js  webdev  security  blog 
9 days ago by jmsmrgn
Twitter
RT : This is a huge step forward! can now be legally used to in disputes in…
evidence  legal  Blockchain  authenticate  from twitter
8 weeks ago by roderik
Login site using cURL - Unix & Linux Stack Exchange
Well, you'll need to store the session data in a cookie. You can use -c cookie_filename to create the cookie (add this to your login command). And then, for the other requests, you can read from the cookie with -b cookie_filename.

In example:

curl -s loginpage -c cookiefile -d "user=myself&pass=secure"
curl -s secretpage -b cookiefile
EDIT:

Notice many times loginpage is not the page you open with your web browser where you introduce your user and password. You'll have to check where the form is posting that data to (search the <form> tag in the source code and the action=... attribute). So, for example, if you want to log in to https://criticker.com, loginpage is https://www.criticker.com/authenticate.php and not https://www.criticker.com/signin.php, which is the one you open with your browser.

A tampering plugin/extension for your browser may help you find the correct loginpage and all the data that is being posted to it (like hidden input fields in the form).

For Servergraph, need https://sgus2.tectrade.co/sgcgi/launchpad_login.cgi
(i.e., different than any file or report to be accessed)
login  log  in  to  web  site  using  curl  password  authenticate 
12 weeks ago by theskett
How to configure nslcd daemon to authenticate with ldap to Microsoft Windows Active Directory? - Red Hat Customer Portal
Environment
Red Hat Enterprise Linux 6.X
Red Hat Enterprise Linux 7.X
Windows 2003/2008/2012 Active Directory with Microsoft Services for Unix 3.5
nss-pam-ldapd (nslcd) used on the client side.
Issue
How to configure nslcd daemon to authenticate with LDAP to Microsoft Windows 2003/2008 Active Directory?
Resolution
To authenticate RHEL 6 system to Microsoft Windows 2003/2008 Active Directory using nss-pam-ldapd. Here are the steps.

Required packages are:

Raw
# yum install nscd pam_ldap nss-pam-ldapd pam_krb5
Ensure that /etc/sysconfig/authconfig file has the following line:

Raw
FORCELEGACY=yes
Now run the following command:

Raw
# system-config-authentication
Or

Raw
# authconfig-tui
Select 'Use LDAP' from User Information section and select "Kerberos Authentication" from authentication section, this will automatically update, nss and pam configurations.

For additional mapping of Windows AD attributes with RHEL, here are sample configuration files.

/etc/nslcd.conf:

Raw
uri ldap://ad.example.com
base dc=example,dc=com
ssl no
tls_cacertdir /etc/openldap/cacerts
binddn cn=puser,cn=users,dc=example,dc=com
bindpw ******
referrals off
filter passwd (&(objectClass=user)(!(objectClass=computer))(uidNumber=*)(unixHomeDirectory=*))
map passwd uid sAMAccountName
map passwd homeDirectory unixHomeDirectory
map passwd gecos displayName
filter shadow (&(objectClass=user)(!(objectClass=computer))(uidNumber=*)(unixHomeDirectory=*))
map shadow uid sAMAccountName
map shadow shadowLastChange pwdLastSet
filter group (objectClass=group)
map group uniqueMember member
scope sub
Once you make the above changes, make sure you start the nslcd service:

Raw
# service nslcd start
# chkconfig nslcd on
Now run the following command to see if you get a list of your users from the AD:

Raw
# getent passwd
Diagnostic Steps
Unable to list users from AD;

Make sure a binddn and bindpw is configured on the machine
Get the user entry from ldap (ldapsearch output for a user) and make sure the mappings configured in nslcd.conf matches with the attribute names on AD
Run nslcd in debug mode (nslcd -d), check the debug logs.
Unable to authenticate users from AD (users are visible from Linux side).

Check whether kinit (kinit username) works or not.
Make sure the Client machine time is sync with Active Directory machine
Check the logfile entries in /var/log/secure .
configure  nslcd  daemon  to  authenticate  with  ldap  Microsoft  Windows  Active  Directory  sssd  ad 
january 2018 by theskett

« earlier    

related tags

-  2  2010s  2011  2fa  401  403  8.1.5  8  access  account  accounts  active  ad  addon  admin  administration  advocacy  alfred  amazon.com  amazon  apache  api  apollo  apple  appleid  asp.net  asp  auditing  auth  authentication  authenticator  authlogic  authorisation  authorise  authorization  authorize  aws  backend  badidea  basic  bigbrother  bitbucket  blockchain  blog  book  branch  brianlayman  browser  c  cakephp  can  cell  certificate  cft  client  cloudformation  clr  code  collaborate  comma  commandline  competitors  configure  connect  control  cookie  cookies  cool  csharp  curl  daemon  data  db  debian  defaultcredentials  defend  delete  delicious-import  delicious  dev  developer  development  devise  devotee  difference  digest  digital  directory  distribute  django  dkim  dml  documentation  domain  domains  dropbox  drupal  e-book  ee2  email  ember  encrypt  encryption  error  evidence  example  explanation  expressionengine  facebook  fb  federate  file  firebase  foaf  follow  form-based  form  forum  function  gem  git  github  gitolite  google  graphql  guide  hack  handshake  headers  heartbeat  hook  how  howto  htpasswd  http  https  identity  imp  in  interface  is  isa  javascript  jenkins  jm  js  json-web-token  json  jwt  key  keygen  kifi  knowledgebase  kstate  language  laracasts  laravel  laravel5  lark_voorhies  layer  ldap  legal  library  linux  log-in  log  login  logins  macosx  magiclink  mailchimp  management  manager  many  marketing  md5  mechanize  member  membership  meteor  mfa  microsoft  mozilla  mutual  mvc  my_main_library  nationalid  needsediting  neologism  network  networkstream  nginx  nodejs  noise  nslcd  ntlm  nymi  oath  oauth  oauth2  objective  objectivec  official  on  open  openid  openssh  otto  owin  password  passwordless  passwords  permission  pgp  phone  php  plugin  pool  post  private  private_discussions  process  programmatically  programming  protect  provider  proximity  proxy  public  punctuation  python  questionable  rails  railscasts  random  reading  reference  repository  request  response  rest  revelation  ruby  rubyonrails  s3  saml  sample  scaling  script  search  securely  security  sell  sentrylogin  server  service  services  sessions  set_auth_cookie  shibboleth  sign-in  sign  simplesamlphp  single  singlesignon  site  smartphone  sms  smtp  snippet  social  source  spectrum  sql  ssh  ssl  sslstream  sssd  staccato  stackoverflow  step  storage  stream  subscribe  taiseer  techcrunch  tenuation  tests  tivoli  to  tool  topper_bowers  troubleshooting  true_light  tsm  tutorial  twitter  two  umbraco  understanding  updating  usb  user  users  using  utilities  ux  verify  version  web  webclient  webdev  windows  with  word  wordpress  wp-hackers  wrist  writing  www-authenticate  you  your...  your  |     

Copy this bookmark:



description:


tags: