> > Dave mentioned a hack for SQL.  Do you/ or Dave know some details about the
> > hack? I need to know wether it can be done with reasonable effort. and what
> > needs to be done.
>
> It is standard in all installs.  It allows a password to be validated
> against the md5 hash.  So you can query ther db for the password and
> then throw it back at the auth layer.  LDAP doesn't support something
> like this, so it isn't possible :(
>
Why isn't it possible? Isn't it the same wether you store the md5 hash in LDAP
or a database? Well, until now we don't encrypt the LDAP based password,
because some applications need plain text password.  We protect the passwords
through LDAP based ACLs.

Cheers,

Christian

--
==================================
Christian Rost
roCon - Informationstechnologie
Herner Strasse 299 B-29
44809 Bochum

fon: +49 (0) 234 33 80 820 - 0
fax: +49 (0) 234 33 80 820 - 9
url: http://www.rocon-it.de




_______________________________________________
Phpgroupware-users mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/phpgroupware-users

Reply via email to