Authldapbindpassword file
Improve this question. Shambhala Shambhala 1, 3 3 gold badges 13 13 silver badges 30 30 bronze badges. Why should your user be able to give a password in the first place and then never again? I need to ensure that nobody can access the program except the person that created the password.
Once the password has been created, the user can login to the program and change the password as many times as they desire. I just need to find a way to make it so the password cannot be easily deleted. Shamballa: That's their responsibility, not yours. If the program is on the computer itself, not running on your server and accessed over a network connection, there's nothing you can do that will keep a determined user with the computer in his possession from gaining access to it.
You can slow him down a little with some tricks, but that's it. Show 1 more comment. Active Oldest Votes. Improve this answer. Mason Wheeler Mason Wheeler Over the internet is a very secure way, but then you have the hassle of making sure your service is always up to allow them to login, like a few of the gaming services out there. This would also allow your licensing structure if you have one to be managed on your server, if the program only works when it can connect to your service.
This has it's own drawbacks for not doing it. Like I said, this brings its own can of worms. But at least it's theoretically possible. What the OP wants simply isn't. I think the ethical issue cuts both ways. As long as the user can change or remove the password by first supplying the existing password I don't think you're taking any rights away from them. The problem is for the user who specifically desires to lock down his or her application once a password has been created — how can that be accomplished?
Add a comment. Kenneth Cochran Kenneth Cochran I was going to mention this as well. Use the password as an encryption key. That way, their data is really secured, and there's no point in deleting the password. The only problem though, is that at lot of people don't actually want their data encrypted.
They want to be able to recover their data in case they forget their password, but they don't want their data to be easily accessible by just opening a program.
I know you can't have your cake and eat it too, but that's what a lot of users want. The Password is to protect access to the actual program. The program I am developing is an email encryption program. I initialize the "key" they use with SHA which becomes the actual key. It is never stored. The problem otherwise would be anyone could Decrypt data using a single pre determined key Petesh Petesh This is a nice option, release the program with some sort of key lock.
This is a much neater model than trying to insist they use internet connection to verify licences. Here is a link to a shareware starter kit, might give you some ideas.
But internally, it was visible to everyone, because the firewall only protects traffic from the outside. The first thing you need to do is tweak httpd. It designates a set of configuration directives that apply to this particular folder. Create a new file called ldap. As I said, I wanted to restrict access to a static website. Inside that directory, create a. Of course, the server address is different, and the part after the slash is the Base DN.
This is the branch of the directory tree where searches should start from. OD by default does not require a user to authenticate to read the structure. You will not need to uncomment the bind options. The example above would allow anyone in the 'Users' group to enroll a device. Make the appropriate changes and then save the. AD by default requires you bind to the directory to read.
Many people create a read-only directory account. AuthType - selects the type of user authentication for a directory. AuthBasicProvider - each authorization module listed in AuthBasicProvider will attempt to verify the user, and if the user is not found in any provider, access will be denied.
The "valid-user" value implies if the user can bind, then they are allowed. This page revision was last changed on Sep by jim Top.
0コメント