https://issues.apache.org/bugzilla/show_bug.cgi?id=57203

--- Comment #4 from Jorgen <[email protected]> ---
Hi again Eric.

I always validate with ldapsearch before configuring the tool (the server must
accept ldap cert and connect thru firewall)

Do the search with 'ldapmanger-user' in ldap for looking up 'myuser'
-- This always works, no surprise --
ldapsearch -xLLLH ldaps://vds.company.biz:636 -D
"cn=ldapmanger-user,ou=Internal,ou=Users,o=company" -w '*****' -b
"ou=Internal,ou=Users,o=Company" "(&(objectClass=inetOrgPerson)(cn=myuser))"

Do the search with 'myuser' in ldap for looking up 'myuser'
-- This return nothing --
ldapsearch -xLLLH ldaps://vds.company.biz:636 -D
"cn=myuser,ou=Internal,ou=Users,o=company" -w '*****' -b
"ou=Internal,ou=Users,o=Company" "(&(objectClass=inetOrgPerson)(cn=myuser))"

Do the search with 'unkownuser' in ldap for looking up 'myuser'
-- This return 'ldap_bind: Invalid credentials (49)' , no surprise --
ldapsearch -xLLLH ldaps://vds.company.biz:636 -D
"cn=unkownuser,ou=Internal,ou=Users,o=company" -w '*****' -b
"ou=Internal,ou=Users,o=Company" "(&(objectClass=inetOrgPerson)(cn=myuser))"

BR Jorgen

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to