I can successfully connect and search to an Active Directory domain controller using ldapsearch. I am using the -x
option, to specify a username/password authentication (password being specified by -W
and username by -D
).
I currently need to dump directory from a MIT-kerberos domain. Kerberos is the only protocol available for authentication. I can retrieve a kerberos TGT ticket with kinit
. I am using these command lines:
ldapsearch -Y SASL -b "REALM.INC" -H ldap://kerberos_IP_address
-> ldap_sasl_interactive_bind_s: Unknown authentication method (-6)
additional info: SASL(-4): no mechanism available: No worthy mechs found
ldapsearch -o "mech=GSSAPI" ...
-> Invalid general option name: mech
How can I authenticate with kerberos using ldapsearch?
Many thanks for your help&replies
You may be missing the
libsasl2-modules-gssapi-mit
package.Without:
Install:
With:
SASL is enabled by default, and will auto-detect a compatible mechanism, so specifying
-Y GSSAPI
isn't even necessary:-Y
is used to specify the SASL mechanism, which will probably beGSSAPI
, though could beGSS-SPNEGO
. Also, base dn must be in dn syntax (i.e.,dc=example,dc=com
), not domain syntax (example.com
).depending on your ldapsearch & OS version, you can try to first authenticate to kerberos using kinit and "cache" your ticket, use it in a kerberos env variable, and then let ldapsearch use this variable, with something like this :