Solved

squid3 on ubuntu 10.10 how to authenticate on users group

Posted on 2011-03-16
3
1,475 Views
Last Modified: 2012-05-11
Hi Experts,
    the questions is in two part.
part 1:
    using squid3, is it possible to have multiple groups of users that have different web access
    needs.  for example group a have full access, group b have access to all except a list of sites. and group c have only access to a list of sites.
   My network work on kerberos, samba ldap... ldap+samba fake an active directory.
part 2:
is it possible to do that using ldap groups and how to do that.

I have a ubuntu 10.10 server and squid3 install.
when I log, I can use my ldap, samba, kerberos users and I got a kerberos ticket.
and when i type groups myusers
it display all ldap groups the user is member of.
thanks
0
Comment
Question by:RogerMoquin
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
paulqna earned 500 total points
ID: 35152367
You need proxy auth.

This link answers all questions. Also has links to ldap examples.
0
 

Author Comment

by:RogerMoquin
ID: 35167428
Ok when I test squid_ldap_auth using the following command:
squid_ldap_auth -b ou=People,dc=mydomain,dc=com -f uid=%s
let say my username and password are rmoquin temp1234
and I type
rmoquin temp1234
it says OK
fine
I change the password to be more secure let say temp$1!2
then I type:
rmoquin temp$1!2
now I get
ERR Success
how can I make special character work?
0
 
LVL 5

Expert Comment

by:paulqna
ID: 35168685
I hope you agree that is a totally different, hence new, question.
0

Featured Post

Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now