[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: Help needed chaining to active directory for authentication - not quite there yet
Hello,
One thing that stopped working since I introduced the new directives which
fixed the authentication problem is
being able to peruse the directories using Apache Directory Studio. I can
still see the AD branches but when I try to look at them I get an error
which in the server logs is reported as
res_errno: 1, res_error: <000004DC: LdapErr: DSID-0C0906E8, comment: In
order to perform this operation a successful bind must be completed on the
connection., data 0, v1db1>, res_matched: <>
ldap_free_request (origid 2, msgid 2)
So I must still be missing something in my configuration.
Thanx
Gaby
>On 09/11/11 19:34 +0000, Gabriella Turek wrote:
>>Hi Dan,
>>
>>The way I got it to work (by pure chance mind you , I just happened on a
>>blog entry somewhere) was to add this entry to the slapd.config file:
>>
>>
>># Configure slapd-ldap back end to connect to AD
>>database ldap
>>suffix "ou=user accounts,dc=niwa,dc=local"
>>subordinate
>>rebind-as-user
>>uri "ldap://aucwdfp01.niwa.local:389"
>>chase-referrals yes
>>
>>Nowhere in any documentation did I see this mentioned, and yet it worked
>>immediately,
>>So I don't know what to think.
>>Gaby
>>
>>
>>
>>
>>On 10/11/11 6:37 AM, "Dan White" <dwhite@olp.net> wrote:
>>
>>>On 07/11/11 21:57 +0000, Gabriella Turek wrote:
>>>>Hello, I've set up an openLDAP server (2.4.23) which chains to an
>>>>Active Directory (2008). I can successfully search for users, it will
>>>>find them in Active Directory if they are not in openLDAP, but I
>>>>cannot
>>>>authenticate the Active Directory users.
>>>>The error is "Invalid credentials (49)"
>>>>Everything is currently configured with clear text
>>>>ldapSearch works fine when pointed directly to the Active Directory.
>>>>
>>>>The chaining configuration in the slapd.conf is:
>>>>
>>>>overlay chain
>>>>chain-uri ldap://aucwdfp01.niwa.local:389
>>>>chain-rebind-as-user TRUE
>>>>chain-idassert-bind bindmethod="simple"
>>>> binddn="cn=SDT Tester,ou=NIWA Staff
>>>>Accounts,ou=User Accounts, dc=niwa,dc=local"
>>>> credentials=xxxxxxx
>>>> mode="self"
>>>> flags=non-prescriptive
>>>>chain-return-error TRUE
>>>
>>>Does mode="none" work? If my reading of slapd-ldap(5) is correct, with
>>>any
>>>config other than 'none', slapd will attempt to assert the proxyAuthz
>>>control.
>>>
>>>I checked our local AD server (2003) and it does not appear to support
>>>that
>>>control:
>>>
>>>ldapsearch -LLL -x -H ldap://<AD.ip> -s "base" -b "" supportedControl
>>>dn:
>>>supportedControl: 1.2.840.113556.1.4.319
>>>supportedControl: 1.2.840.113556.1.4.801
>>>supportedControl: 1.2.840.113556.1.4.473
>>>supportedControl: 1.2.840.113556.1.4.528
>>>supportedControl: 1.2.840.113556.1.4.417
>>>supportedControl: 1.2.840.113556.1.4.619
>>>supportedControl: 1.2.840.113556.1.4.841
>>>supportedControl: 1.2.840.113556.1.4.529
>>>supportedControl: 1.2.840.113556.1.4.805
>>>supportedControl: 1.2.840.113556.1.4.521
>>>supportedControl: 1.2.840.113556.1.4.970
>>>supportedControl: 1.2.840.113556.1.4.1338
>>>supportedControl: 1.2.840.113556.1.4.474
>>>supportedControl: 1.2.840.113556.1.4.1339
>>>supportedControl: 1.2.840.113556.1.4.1340
>>>supportedControl: 1.2.840.113556.1.4.1413
>>>supportedControl: 2.16.840.1.113730.3.4.9
>>>supportedControl: 2.16.840.1.113730.3.4.10
>>>supportedControl: 1.2.840.113556.1.4.1504
>>>supportedControl: 1.2.840.113556.1.4.1852
>>>supportedControl: 1.2.840.113556.1.4.802
>>>supportedControl: 1.2.840.113556.1.4.1907
>>>supportedControl: 1.2.840.113556.1.4.1948
>>>
>>>
>>>proxyAuthz control == 2.16.840.1.113730.3.4.18 (RFC 4370)
>>>
>>>--
>>>Dan White
>>
>>
>
>--
>Dan White
>BTC Broadband
>Ph 918.366.0248 (direct) main: (918)366-8000
>Fax 918.366.6610 email: dwhite@olp.net
>http://www.btcbroadband.com