[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Access Control Question
Does anybody have some good references to help in debugging an access
control problem? I have a third party security product that can use
LDAP to authenticate. Right now it looks like the only user I can get
to authenticate is the rootdn, no other users seem to work. I can see
the product connecting and performing a search using a valid filter but
authentication fails anyway. I was originally suspect of the security
software, or the possibility I had not compiled in the correct
encryption routines. When I got the rootdn entry to work with its {SHA}
encrypted password it invalidated that theory. Any ideas?
Thanks - Tod