I've been running FreeRadius 2 on Centos 5.5 for a while now. So far so good. I'm now looking to make connecting to our WPA secured wireless easier. The RADIUS server is running in a VM and since the system is in use I have copied the original and used that copy to create a test environment. I have run through all system updates and have upgraded all relevant packages. The test system is at 5.6 now. Currently with Windows machines I can't just connect to the SSID and enter in a username and password. I have to go and manually add the SSID, modify some settings; specifically turning off validating server certificate, turning off automatically use my Windows login, and turning on User or computer authentication mode. We also have some OS X clients. Fortunately connecting via OS X is easier. The catch is that I have to join the machine to our domain. After that it's pretty much username and password, and they are on. Ideally I would like to have a simple "connect to this SSID, enter your username and password and that's it" solution and still have all requests checked against our Active Directory server. On a side note. I'm going through my settings trying to get this working more smoothly and I ran across: wbinfo --a user%password (yes I'm adding in my username and pass) plaintext password authentication succeeded challenge/response password authentication failed error code was NT_STATUS_ACCESS_DENIED (0xc0000022) error messsage was: winbind client not authorized to use winbindd_pam_auth_crap. Ensure permissions on /var/cache/samba/winbindd_privileged are set correctly. Could not authenticate user MYUSERNAME with challenge/response I know the 2 error lines are permissions related. I'm not sure what the permissions should be on this file/folder. Can someone let me know this? The tutorial from FreeRadius says that I should get output similar to: plaintext password authentication failed error code was NT_STATUS_NO_SUCH_USER (0xc0000064) error message was: No such user Could not authenticate user CHSchwartz%mypassword with plaintext password Yet ntlm_auth --request-nt-key --domain=MYDOMAIN --username=MYUSERNAME NT_STATUS_OK: Success (0x0) So the Auth is working. I don't understand though why my AD server is letting cleartext passwords through. It shouldn't right? Any help would be greatly appreciated. Dan <http://www.liai.org> <http://www.liai.org> -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20110726/2698f0c9/attachment-0004.html>