Reading Time: 5 minutesI was asked lately to check some things connected with authentication users accessing Apache based web-site against AD. It is quite simple but requires some configuration so I’ve gathered things all together and here is is – how to make Apache web server authenticating users against AD using mod_auth_kerb module. Here’s a recipe for mine … Continue reading "Apache and kerberos authentication within AD domain"
Category: 1047
Using ADFS with Content Management Server 2002
Reading Time: 4 minutesMaybe CMS 2002 is not most popular content management software in the world but some people are using it in the real world. This is a case with our customer here who will deploy web application based on CMS 2002 in his network. This company maintains two separated AD forests, one is internal forest for … Continue reading "Using ADFS with Content Management Server 2002"
Dynamic objects aka why You should upgrade to Windows 2003 SP1 if You haven’t done it yet
Reading Time: < 1 minuteToday I finally arrived into office after long time being on-site at customer’s office and I had some time to read blog feeds I’m subscribed to. One of my ‘must read’ blogs is Joe’s blog and I’ve noticed some new entries there. Among them on which I found very interested, and everyone who is still … Continue reading "Dynamic objects aka why You should upgrade to Windows 2003 SP1 if You haven’t done it yet"
Blue Frog's life after death
Reading Time: < 1 minuteYesterday I wrote about Blue Security, the maker of Blue Frog service fall under the pressure of spammer's attack targeted against its service. But as in Star Wars now hope raised on the ruins of Blue Security – new project called Okopipi was started as Blue Frog's successor. Idea of Okopipi is to build service … Continue reading "Blue Frog's life after death"
Rise and fall of Blue Frog
Reading Time: 3 minutesI was quite busy in last week and I still will be busy in coming weeks. Because of this I missed few things in news and Internet – one of such things, which I think is very important, is fall of Blue Security, Internet company from Israel. I was pointed to this story by my … Continue reading "Rise and fall of Blue Frog"
Fighting spyware – lets hunt the bug
Reading Time: 2 minutesI had an issue with spyware last weekend. OK – it's also my fault, this machine was infected when my girlfriend's sister was using it and she knew the access to admin account. This machine was infected with a bunch of spyware and malware. Just want to share with You few thoughts about it. I … Continue reading "Fighting spyware – lets hunt the bug"
Confidential bit follow-up
Reading Time: < 1 minuteAfter my previous post about confidential bit I received great feedback through blog comment system (Thanks Jorge and Lee) and in off-line conversation on newsgroup. I’ve decided to gather this additional information in next post as an update to my original one. First of all when You want to use confidential bit for some attribute … Continue reading "Confidential bit follow-up"
How to create and use confidential attributes
Reading Time: 4 minutesLately I have to explain to one of our customers how to create attribute in Active Directory which can be protected with additional permissions from reading its content. Such possibility was introduced in Windows 2003 SP1 but when I looked for some information to point our customer to I didn’t found much documentation so I … Continue reading "How to create and use confidential attributes"