Robert,

Thank you for you answer.
In fact it looks like the V1 code works fine with AD. Just a quick note about what we have learnt.
Other than authenticating using the traditional ldap DN name (CN=John Doe, DC=acme,DC=com) , AD simple authentication accepts by default the domain\sAMAccount name which stands for pre windows 2000 accounts.
We just need to set rootContext to the something like dc=acme,dc=com, and the usercontext to just {0}.
In my setting, I am just appending the rootContext to the url, getting somehting like ldap://ldap.acme.com:389/dc=acme,dc=com

In our project, we do not need any roles from AD, then once we authenticate, we get them from our own repository. But searching the roles withing a ldap attributes works fine too.

In another line, regarding your option 2, yes, I appreciate if you can send me Joseph's code to see if I can add something to it.

Cheers,
Gus.


On 7/26/05, Robert r. Sanders <[EMAIL PROTECTED]> wrote:
Gustavo,
    Currently my main computer is down, so I don't have all my normal links and stuff, which would help me answer a little better; but here goes.

    I've never used Active Directory, but my understanding is that the "standard" setup I have been using for my tests does not account for it.  I know of 2 proposed changes to address this:

1. The first is checked into the sandbox under the branch name "ldap_refactor_07-20-2005"
http://cvs.sourceforge.net/viewcvs.py/acegisecurity/acegisecurity/sandbox/src/main/java/net/sf/acegisecurity/providers/dao/ldap/?>

    - The issues with it are: AD only solution (not general to LDAP); requires the Netscape LDAP classes, which are open source, but are not widely used or available.

2. The other is Joseph's alterations to my v2 code, which I never got around to commiting as I was convienced I could refactor what I had to be much cleaner than it was.  I can send you a copy of Joseph's code if you want.

I am still trying to finish a general LDAP solution that included proper support for AD style setups; but it seems that every time I think I'm going to have the time something else comes up at the last minute.



Gustavo Faerman wrote:
Robert,

In our current scenario, we are using the ldap V1 authentication class and it is working fine authenticating against MS AD. Now, in this particular AD, a typical CN for a user is CN=Gustavo E. Faerman. Using this as the user name works fine. It happens users use the domain\samaccountname  style to login, then they mostly do not know their full name.

I do not quite get how to configure the userContext to use the sammaccountname. I have tested the domain\sammaccountname with 3rd party ldap browsers and they work fine.

Any hints/tips?

Thanks in advance,
Gustavo.


On 6/25/05, Gustavo Faerman <[EMAIL PROTECTED] > wrote:
Robert and Joseph,

Im looking the LdapPasswordAuthenticacionDao (R2).

Any chances you just share here your spring beans xml files for basic ldapSupport and UserSearchBean classes?. Just need to setup a quick test here.
Or any code where you just use this classes. Does not need to be productioni quality code. Just to move forward.

Thanks in advance,
Gustavo.




-- 
Robert r. Sanders
Chief Technologist
iPOV
(334) 821-5412

www.ipov.net




Reply via email to