Simple Authentication and Security Layer
Hi All,
What is Simple Authentication and Security Layer (SASL)?? and what it's function in Oracle Beehive??
Thanks,
Dha_Suh
wikipedia :
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization, a facility allowing one user to assume the identity of another. Authentication mechanisms can also provide a data security layer offering data integrity and data confidentiality services. DIGEST-MD5 is an example of mechanisms which can provide a data security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.
SASL was originally specified in RFC 2222, authored by John Gardiner Myers while at Carnegie Mellon University. That document was obsoleted by RFC 4422, edited by Alexey Melnikov and Kurt Zeilenga.
SASL is an IETF Standard Track protocol, presently a Proposed Standard.
Similar Messages
-
Simple authentication and authorization with a servlet and a filter
Could somebody point me to code example that do simple authentication/authorization using one servlet and one filter? (without Spring, Struts, JSF or any framework)
I’m having a lot of problems with that, apparently, easy task.
These are the rules:
- A simple login page
- Two roles (admin, registered).
- If the user loged is an admin, redirect to his entry page (private/admin/index.jsp).
- If the user loged is of role registered, redirect him to his entry page (private/registered/index.jsp).
- If it’s not a valid user, redirect again to login page.
- Admin’s users cannot go to private/registered/ area.
- Registered users cannot go to private/admin/ area.
- Non authenticated user cannot go to private/ area
Thanks a lot in advance!
Edited by: JLuis on 25-ago-2010 15:27AccessControl.java:
package com.tlsformacion.security;
import java.io.IOException;
import javax.servlet.RequestDispatcher;
import javax.servlet.ServletConfig;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import com.tlsformacion.utils.Log;
public final class AccessControl extends HttpServlet {
private static final long serialVersionUID = 5741058615983779764L;
private static final String USERNAME_ATTR = "username";
private static final String PWD_ATTR = "password";
private static final String LOGIN_PAGE_ATTR = "login_page";
private static final String ROL_ATTR = "role";
private boolean isAuthentic = false;
private String role = null;
private String loginPage = null;
public AccessControl() {
super();
public void init(ServletConfig config) throws ServletException {
loginPage = config.getInitParameter(LOGIN_PAGE_ATTR);
protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside doGet");
doAccessControl(request, response);
protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside doPost");
doAccessControl(request, response);
private void doAccessControl (HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside doAccessControl");
doAuthentication(request, response);
if (isAuthentic) { //Authentic user
doAuthorization(request, response);
} else { //User NOT authentic
doRejection(request, response);
private void doAuthentication(HttpServletRequest request, HttpServletResponse response) {
debug("Inside doAuthentication");
String requestedURI = request.getRequestURI();
if (requestedURI.contains("/AccessControl")) { //Comes from login page
debug("Comes from login page");
String username = request.getParameter(USERNAME_ATTR);
String pwd = request.getParameter(PWD_ATTR);
role = getRole(username, pwd);
if (role != null) {
isAuthentic = true;
request.getSession().setAttribute(ROL_ATTR, role);
} else { //Doesn't comes from login page
debug("Doesn't comes from login page");
if (isInSession(request)) {
debug("Rol is in session");
isAuthentic = true;
} else {
debug("Rol is NOT in session");
private void doAuthorization(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside doAuthorization");
String requestedURI = request.getRequestURI();
debug("requestedURI: " + requestedURI);
if (requestedURI.contains("/AccessControl")) { //Comes from login page
goHomePage(request, response);
} else if (requestedURI.contains("/private/" + role)) { //Trying to access his private area
goRequestedPage(request, response);
} else { //Trying to access other roles private area
goLoginPage(request, response);
private void doRejection(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside goRejection");
role = null;
goLoginPage(request, response);
private void goHomePage(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside goHomePage");
String homePage = "private/" + role + "/index.jsp";
goPage(request, response, homePage);
private void goLoginPage(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside goLoginPage");
goPage(request, response, loginPage);
private void goRequestedPage(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
debug("Inside goRequestedPage");
String contextPath = request.getContextPath();
debug("contextPath: " + contextPath);
String requestedPage = request.getRequestURI().replace(contextPath + "/", "");
goPage(request, response, requestedPage);
private void goPage(HttpServletRequest request, HttpServletResponse response, String page) throws IOException, ServletException {
debug("Inside goPage ...trying to go to: " + page);
//Option A
response.sendRedirect(page);
//Option B
//RequestDispatcher requestDispatcher = request.getRequestDispatcher(page);
//requestDispatcher.forward(request, response);
private boolean isInSession(HttpServletRequest httpRequest) {
boolean inSession = false;
role = (String)httpRequest.getSession().getAttribute(ROL_ATTR);
if (role != null && !role.equals("")) {
inSession = true;
return inSession;
//PENDIENTE: mock method!
private String getRole(String username, String pwd) {
String role = null;
if (username.equals("admin") && pwd.equals("admin")) {
role = "administrator";
} else if (username.equals("regis") && pwd.equals("regis")) {
role = "registered";
return role;
private void debug(String msg) {
Log.debug(msg);
}Proyect Folder Structure:
WebContent
login.html
private
administrator
index.jsp
registered
index.jspBasically, the problem is that if you try to log as admin/admin (for example) the servlet AccessControl executes infinitely
Edited by: JLuis on 26-ago-2010 8:04 -
802.1x multipoint authenticator and security issue
Hi everybody
Let say we have following set up:
host1
host2 ) ----------------hub------ f1/0-switch( authenticator)-------------------------Radius server.
host3
The switch is configured as follows.
Switch(config)#interface FastEthernet 1/0
Switch(config-if)#dot1x port-control auto
Switch(config-if)#dot1x host-mode multi-host
Let say only host1 has valid credentials and the rest hosts i.e h2,h3 are rogue hosts. host1 sends authentication request and successfully authenticated and switch transition its port to an authorized state. But does it not mean the other hosts h2 and h3 which were not authenticated but yet are able to access network ?
thanks and have a great weekend.This board is more for Wireless Security not LAN. but I would think it's because you are connecting through a hub instead of a switch. Hubs share the data, so when the switch gets the auth for the valid client it turns that port as it should.
Now an invalid client connects and because the port is already thinking the client is valid, it passes all the traffic.
Make sense?
Steve
Sent from Cisco Technical Support iPhone App -
OSB: The different between transportation layer and security layer
Dear All,
Do you have any idea for compare about security on service bus between transportation layer and message layer?
Which one is better? And do you have any factor to consider which one I should use?
Best REgards,If you are working with OSB 11g, please refer -
http://download.oracle.com/docs/cd/E17904_01/doc.1111/e15866/part_sg.htm#sthref1029
Ofcourse you would like to have both of them if you want a healthy system. If your OSB services are internet facing then it is a sensible decision to have both transport (a bare minimum) & message security. If your services are exposed to a LAN/WAN then you may have either or both of them. Remember, securitiy processing is always an overhaed to the performance so should be used as and when required only.
Regards,
Anuj -
Oracle externally-authenticated and security
Hi,
I work on security project and i want to know if create an externally user is good in a security context.
ThanksExternal authentication comes in the category of the security loophole since anyone who can access the system , can come in the system. That said, you should check Pete Finnigan's notes about security and also check his website, www.petefinnigan.com .
HTH
Aman.... -
Simple Public and Private Security Authentication Authorisation
Simple question:
I have an application with public access (No Authentication)
I want to Authenticate just one administration page with a logon screen. What do I need to do?
Do I use Page Authentication or Page Authorization on the restricted page?
Please spell out the steps in clear detail.
Also what is the difference between Application Authentication and Application level Authorization. They seem identical in function to me.
regards
Paul PPaul - Building on what Jos said, you might have an application that used SSO for authentication and for which you wanted to block access to certain classes of users during certain time periods. For this, an application-level authorization scheme could be useful, checking the authenticated user's organizational role/job code and the other criteria dictating the application availability.
For your case, I recommend that you make the application use an authentication scheme that is suitable for controlling access to the admin page(s) and then set the Security (Authentication) attribute of every other page to 'Page Is Public'.
Scott -
Simple Plug and Play Secure Wireless?
I am trying to setup a simple way to have wireless users on our network be able to connect to our access points, authenticate to our ACS Server (Cisco Hardware ACS applicance) but without having to go through special configurations on the client. This needs to be secure too and not easily broken. We are using Cisco 1200 and 1300 802.11G AP's and the clients vary from having integrated wireless NIC's to running Cisco Wireless cards, to running other branded cards. We are currently using PEAP, but it is time consuming to configure and sometimes confusing to the users. I was thinking of switching to open authentication on a isolated subnet and using a Cisco BBSM (Building Broadband Service Manager) to securely connect to our network, but Cisco just made this device end of sale, end of life, so I'm hesitant to go this route. WPA/WPA2 or some of the other PEAP/EAP/LEAP are configuration intensive too. Any suggestions? Does cisco have anything to replace the BBSM? What about PPOE? Would this be an alternative? Can I use a router or firewall to terminate these connections or would I need a specialized server or other device? I really need a simple way to securly connect end users to our wireless network without any undue configuration on their end.
Probably the easiest would be to keep the wireless communications open, and use a VPN concentrator running to an SSL VPN client on the laptops/pcs.
All they'd have to do is aim their browser that the VPN gateway, and allow the SSL client to be downstreamed to their computer.
Beyond that, use your BBSM proxy or provide user auth at the VPN concentrator.
Leave the SSID in broadcast mode ("guest").
With this system, most clients can find the wireless system (SSID broadcast), the encryption via the SSL VPN is very strong, and there'd be no real configuration for the clients. Just aim the browesr at the VPN gateway/concentrator and enter the username and password.
Also, make sure you enable "Public Secure Packet Forwarding" (PSPF) to prevent one client from attacking other clients on te wireless LAN.
Users that use the system on a regular basis could get / use certificates for authentication. If they're on the system a lot, then the minor grief of setup would be worth it.
The SSL client uses Java, I believe, so it should be fairly universal (i.e., not platform specific). I haven't tried te SSL client n any system other than MS Windows so I can't really comment on *nix or Mac.
The SSL gate ( 3000 series) that we use for our Lab access seems to work pretty well.
Good Luck
Scott -
Simple Authentication with SMP 10.1 and FMS 3.5
Good day all,
I am looking to add simple authentication to the SMP player for use with FMS 3.5. I recently came across a technical paper published by Adobe titled, "Video content protection measures enabled by Adobe Flash Media Interactive Server 3.5". Within this document are three examples of user authentication with code samples. I am starting with the "simple" client verification using a unique token authentication key method first.
I've noticed that SMP doesn't have any FMS security mechanisms built-in at least that I've been able to identify in the documentation or feature specs. Did I miss something? I am looking for assistance in getting started with adding this feature to SMP. So my question is where could I add the client side Actionscript within the SMP structure?
I'd very much like to hear about others' experiences with adding security mechanisms to SMP used with FMS.
Thank you.Andrian - Thank you for the quick reply. I'm gald SMP has support for the playback of protected content. Is there more documentation than this demo on this topic?
I'll explain what I'm doing. I am implementing SMP as the default video player application used in online courses at the Savannah College of Art and Design. Identifying the player and implementing its use in our production workflow is the first step in a strategy to deliver a better video experience and leverage the scalibility and flexibility of SMP. On the back end integration with our FMS I have been asked to implement some user authentication. We don't need to re-auth the students as they have already been authenticated through our LMS. What is desired is each player instance authenticates with our server to prevent stream ripping.
The simple user token authentication key example from the linked document seems to best suit this intial need. -
DS 5.2: Plugin to force SSL/TLS and simple authentication available!
Hi,
for privacy and security reasons I had to enforce TLS for simple authentication
in my organisation on all client connections to our directory servers.
As it turned out in thread
http://forum.java.sun.com/thread.jspa?threadID=5239916
there is no easy possibility to do this. Even though there seems to be a
way by using the directory proxy server (looks very complicated), described
in thread
http://forum.java.sun.com/thread.jspa?threadID=5240537,
I finally decided to write a plugin. To let you know what the plug-in does
exactly I paste the description here in:
DESCRIPTION
The plug-in checks every client connection if it is encrypted or not.
If the connection is encrypted, it accepts the connection.
If not, it rejects the connection.
It is possible to configure the plug-in to accept unencrypted
connections from certain IPs. With this feature enabled, you may
allow unencrypted connections from 127.0.0.1 or similar.
Additionally, this feature helps you to deploy the plug-in in
a production environment.
Another configuration option allows a dry-run of the plug-in.
This means, that the plug-in only logs (in the error log), but accepts
unsecured connections.
The configuration of the plug-in may be stored in an arbitrary DN of
your DIT. This way you are allowed to change the configuration
parameters without restarting the directory server.
By replicating the configuration entry you may enable and disable
the dry-run mode for all your replicas by one click. Adding IPs,
from where clients are allowed to connect unencrypted is also
configurable for all replicas at once.
END OF DESCRIPTION
In the source code there are also detailed installation instructions
and a configurable Makefile is also provided.
I brute-force tested the plugin and it causes no memory leaks or similar issues.
Now I want to publish the code, since I am sure, that other people may need it to!
Unfortunately there is no public code repository or similar for directory server
plugins. So if anyone is interested in the plugin, I will put the source code online.
best regards
Harald StrackHi Harald:
I'm interested in looking at the code of your plugin. Could you please share the source code to us.
Thanks- -
Do I need and how to secure the Unix/Linux agents authentication and communication to RMS?
Hi everybody
We have an environment including SCOM 2012 SP1, 10 windows server, 40 linux servers and 10 HP-UX servers. all of them are joined a trusted domain. I know the authentication method between windows agents and management server is kerberos. but not for linux and
HP-UX servers.
Now I want to secure the Unix/Linux agents authentication and communication to RMS. some questions:
1- how much secure and credible is current authentication method? and in a high secure environment can I trust SCOM self signed Certificates?
2- Considering this point that Unix/linux computers are joined to active directory domain and are using Kerberos to authenticate, can I use this
authentication method between RMS and linux Agents?
3- if I make a decision to use certificates should I use gateway server? (considering all servers and RMS are in same trusted domain)
any other suggestion?
Thanks in advancenothing?
-
What's the difference between, just for example, "login block-for 100 attempts 15 within 100" and "security authentication failure rate 3"?
Please ignore the numbers, I need to know what the differences are in commands and what they do, what they affect.security authentication failure rate number_of_failed_attempts : A global configuration mode command used to specify the maximum number of failed attempts (in the range of 2 to 1024) before introducing a 15-second delay
login block-for 100 attempts 15 within 100 : Block all access after 15 failed login attempts within 100 Secs for the period of 100Secounds (1.40 Minutes).
The Cisco IOS Login Enhancements (Login Block) feature allows users to enhance the security of a router by configuring options to automatically block further login attempts when a possible denial-of-service (DoS) attack is detected.
The login block and login delay options introduced by this feature can be configured for Telnet or SSH virtual connections. By enabling this feature, you can slow down "dictionary attacks" by enforcing a "quiet period" if multiple failed connection attempts are detected, thereby protecting the routing device from a type of denial-of-service attack. -
Simple inquiries regarding keylock and security.
Hi,
I recently bought a Nokia phone, I first read the whole manual which comes with the product 3 times and I’m still discovering the phone but I still have few inquiries regarding keylock and security which the showroom didn’t mention.
To lock the keypad to prevent accidental or unwanted keypresses, I select Menu key then *, while for unlocking, the same step is required along with providing the lockcode which I already set in Menu > Settings > Phone > Security keyguard. Nothing easy then this :robothappy:
Here are detailed questions as per guidelines.
A) Question here is: what are the differences between “Menu > Settings > Phone > Security keyguard” and “Menu > Settings > Security > Access codes > Change security code”??
after reading the manual, I now know that “phone > Security keyguard” is to simply lock the keypad with a security code decided here too, but what about “access codes > Change Security Code”? is it the same as “Security keyguard” (i.e. lock keypad with a code)? are they of any relation to each others?
In other words: I know when “Security keyguard” is required (lock keypad with a code), but what are the cases when “security code” is required?
B) in “Security keyguard”, each time (that’s always) when we want to lock the phone (i.e set Security keyguard to ON) we are automatically prompted to set a password to be able to lock the phone (I’m 100% sure of this). So what is code 12345 useful for while we are always prompted to type a password each time we set the keyguard on! I’m afraid it’s not that clear in the manual. In other words When might this 12345 be used?
Is it used to unlock keypad for example, maybe no! because as I said each time we want to lock the phone with keyguard we’re prompted to set a code.
oh and how to change 12345 that’s if it’s of any use anyway?
I’m a newbie in mobile phones’ matters, so bare with my silly questions but I really don’t want to deteriorate the mobile phone now in holidays when careline is out of service.
..who wants kudos
guidelines for Nokia discussion forums are here: http://discussions.europe.nokia.com/discussions/board/message?board.id=guidelines&thread.id=2
Solved!
Go to Solution.thanks to areef_apu i noticed the relation between “Security keyguard” and “Change security code” you said that the “Security code”12345 is used for “Keyguard security”!! wow that’s right. I got this wrong in my question since while I was learning about and activating“Security keyguard” it seems that I was accidentally using the code 12345 without any intention, which made me confused thinking that “security keyguard” code is decided at the same time while setting “security keyguard” while I didn’t know that I was actually telling it the already set security code and not typing a new one here!
So “Menu > Settings > Phone > Security keyguard” is really related to “Menu > Settings > Security > Access codes > Change security code”. Simply said, for keypad lock, the screen asking us to type a code while activating the “Security keyguard” is Not asking us to decide a New code but it’s actually asking us the code already set in “Access codes > Change security code”. that’s the relation.
Thanks so much to both cjlim and areef_apu +1 Kudos point each this now makes sense for other newbies reading this since I’m newbie myself.
..who wants kudos
guidelines for Nokia discussion forums are here: http://discussions.europe.nokia.com/discussions/board/message?board.id=guidelines&thread.id=2 -
Hi everyone, im having problems in a wireless network, the SSID has security layer 2 WPA, layer 3 web authentication (internal default page), and external RADIUS.
When a client makes a roaming from one AP to another one or when he has a idle time, he needs to re authenticate in the web login page. Somebody knows a solution to avoid this behavior?. Or somebody has a troubleshooting way to determine why the clients have this problems??A few things I can share that might help .. Your actually feet on the ground will be importnat to see this issue for yourself.
I know when a client or if the AP sends a DEAUTH frame the client will need to reestablish its connection and it will 100% of the time require a new web auth. If a client loses connection while roaming and a DEAUTH is sent on either side you will get the page. If youre client isnt romaing cleanly this can be a problem.
Another problem is your using EAP. Are you using CCK or a device that supports OKC. What does your radius server say when a client roams ?
You could also simply your config and then reapply your security and see where it breaks. By this I mean. For testing, create a SSID turn off security and leave layer 3 web auth on. Roam and see what happens. If it works, then start to apply the security and see where it breaks.
"Satisfaction does not come from knowing the solution, it comes from knowing why." - Rosalind Franklin
"I'm in a serious relationship with my Wi-Fi. You could say we have a connection." -
JAXWS EJB3.0 Based WebService Authentication and Authorization - Weblogic
Hi Experts,
I need to Create a EJB3.0 WS where this Service has static Authentication and Authorization. How can I achieve it, any pointer.
TIAThe below sample is for basic authentication and authorization.
Web service
========
import javax.ejb.Stateless;
import javax.ejb.TransactionAttribute;
import javax.ejb.Remote;
import javax.jws.WebMethod;
import javax.jws.WebService;
import javax.annotation.security.RolesAllowed;
import javax.ejb.SecurityRoles;
@Stateless(mappedName="com.slsbBean")
@Remote( { com.bea.Service.class})
@WebService(name="TransactionPortType", serviceName="TransactionService",
targetNamespace="http://example.org")
public class ServiceBean implements Service {
@WebMethod()
@RolesAllowed ( {"Admin","Manager"})
public void testMethod(String s) {
System.out.println("inside ejb method");
System.out.println("username : " + weblogic.security.SubjectUtils.getUserPrincipal(weblogic.security.Security.getCurrentSubject()));
Client
====
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class Test {
public static void main(String[] args) {
TransactionService simple = new TransactionService();
TransactionPortType port = simple.getTransactionPortTypePort();
BindingProvider bindingProvider = (BindingProvider) port;
Map<String, Object> reqContext = bindingProvider.getRequestContext();
reqContext.put(BindingProvider.USERNAME_PROPERTY, "XXXXXX");
reqContext.put(BindingProvider.PASSWORD_PROPERTY, "XXXXXX");
port.testMethod("hello");
Regards,
Sunil P -
Hi I am using suin direcory server 6.0 with my application. To test my connection I supplied the rootDN, userDN, host, port and password with 'simple' authentication mode but my test fails with following exception on console;
SunOS-/export/home1/tecapp/TCS/tcserver/directory/INFOBASIC: testLDAP
com.temenos.tocf.security.TCSecurityException: The authentication mechanism simple not supported by LDAP Server : ldap://hml-newsunt2a:389/uid=myT24,cn=T24,cn=Application,o=temenos,c=ch with user t24userid=inputter,uid=myT24,cn=T24,cn=Application,o=temenos,c=ch
at com.temenos.tocf.security.common.LdapUtilities.getDirContext(LdapUtilities.java:447)
at com.temenos.tocf.security.management.T24User2Directory.connect(T24User2Directory.java:255)
at com.temenos.tocf.security.management.T24User2Directory.connect(T24User2Directory.java:185)
at com.temenos.tocf.security.management.T24User2Directory.getSysDNListImpl(T24User2Directory.java:330)
at com.temenos.tocf.security.management.T24User2Ldap.getSysDNList(T24User2Ldap.java:84)
------------- GETSYSDN -------------------
Time for call of CALLJ : 4820 [ms]
20üError connecting LDAP server : The authentication mechanism simple not supported by LDAP Server : ldap://hml-newsunt2a:389/uid=myT24,cn=T24,cn=Application,o=temenos,c=ch with user t24userid=inputter,uid=myT24,cn=T24,cn=Application,o=temenos,c=ch
Log File (access) in My LDAP Server recorded following at the same time;_
[10/Nov/2009:15:35:21 +0000] conn=171 op=-1 msgId=-1 - fd=22 slot=22 LDAP connection from 10.44.5.69:53988 to 10.44.5.69
[10/Nov/2009:15:35:21 +0000] conn=171 op=0 msgId=1 - BIND dn="" method=128 version=3
[10/Nov/2009:15:35:21 +0000] conn=171 op=0 msgId=1 - RESULT err=0 tag=97 nentries=0 etime=0 dn=""
[10/Nov/2009:15:35:21 +0000] conn=171 op=1 msgId=2 - SRCH base="uid=myt24,cn=t24,cn=application,o=temenos,c=ch" scope=0 filter="(obj
ectClass=*)" attrs="supportedSASLMechanisms"
[10/Nov/2009:15:35:21 +0000] conn=171 op=1 msgId=2 - RESULT err=0 tag=101 nentries=1 etime=0
[10/Nov/2009:15:35:21 +0000] conn=171 op=2 msgId=3 - UNBIND
[10/Nov/2009:15:35:21 +0000] conn=171 op=2 msgId=-1 - closing from 10.44.5.69:53988 - U1 - Connection closed by unbind client -
[10/Nov/2009:15:35:22 +0000] conn=171 op=-1 msgId=-1 - closed.
[10/Nov/2009:15:35:24 +0000] conn=172 op=-1 msgId=-1 - fd=22 slot=22 LDAP connection from 10.44.5.69:53989 to 10.44.5.69
[10/Nov/2009:15:35:24 +0000] conn=172 op=0 msgId=1 - BIND dn="t24userid=inputter,uid=myT24,cn=T24,cn=Application,o=temenos,c=ch" met
hod=128 version=3
[10/Nov/2009:15:35:24 +0000] conn=172 op=0 msgId=1 - RESULT err=48 tag=97 nentries=0 etime=0
[10/Nov/2009:15:35:24 +0000] conn=172 op=1 msgId=0 - RESULT err=80 tag=120 nentries=0 etime=0
[10/Nov/2009:15:35:24 +0000] conn=172 op=-1 msgId=-1 - closing from 10.44.5.69:53989 - A1 - Client aborted connection -
[10/Nov/2009:15:35:24 +0000] conn=172 op=-1 msgId=-1 - closed.Please help me and suggest a workaround please as I couldn't found any information regrading this on google.
Thanks
SJunejo[10/Nov/2009:15:35:24 +0000] conn=172 op=0 msgId=1 - RESULT err=48 tag=97 nentries=0 etime=0err=48 is "inappropriate authentication". Maybe you don't have SASL configured properly.
Please have a read of the admin guide.
[http://docs.sun.com/app/docs/doc/820-2763/bcave]
Maybe you are looking for
-
iPod version shown in iTunes as "4.3.4" (not listed in the OS drop-down associated with setting up this post. Appeared to download the update OK but as soon as it went to install it came up with "The iPod "xxxxx" could not be updated because the fi
-
PL/SQL parser for 8.1.5
Hi, Can anyone tell me a URL from where I can download the PL/SQL XML parser 1.0.1. -- OTN only has 1.0.2 which uses the later JDK, causing the "failure to resolve" errors. Thanks John
-
How to extract row_id from PL/SQL procedure and assign that to batch script
Hello Team, I am stuck with a requirement, wherein I am running a batch script and within the batch script I am calling a procedure which inserts a record in a table (Including a column named l_id). I need this generated l_id to be passed on as a var
-
Hi All, I have aneed to create charts based on multipple key figures for a couple of key figures. I have all my key figures in column and the characteristics in the row. WBS Element and Dates are in Row and 3 KYF are in the column. The user would li
-
My iMac takes 15 minutes to start up
My iMac is taking 15 minutes to start up. I have tried starting in Safe Mode and it is still the same.