> > Dave mentioned a hack for SQL. Do you/ or Dave know some details about the > > hack? I need to know wether it can be done with reasonable effort. and what > > needs to be done. > > It is standard in all installs. It allows a password to be validated > against the md5 hash. So you can query ther db for the password and > then throw it back at the auth layer. LDAP doesn't support something > like this, so it isn't possible :( > Why isn't it possible? Isn't it the same wether you store the md5 hash in LDAP or a database? Well, until now we don't encrypt the LDAP based password, because some applications need plain text password. We protect the passwords through LDAP based ACLs.
Cheers, Christian -- ================================== Christian Rost roCon - Informationstechnologie Herner Strasse 299 B-29 44809 Bochum fon: +49 (0) 234 33 80 820 - 0 fax: +49 (0) 234 33 80 820 - 9 url: http://www.rocon-it.de _______________________________________________ Phpgroupware-users mailing list [email protected] http://lists.gnu.org/mailman/listinfo/phpgroupware-users
