ericleme commented on issue #11469: URL: https://github.com/apache/druid/issues/11469#issuecomment-956027724
Did you manage to fix this issue, I'm facing the same LDAP: error code 34 - Invalid DN, however I couldn't find what is wrong in the configuration. basedn, as well the users are reachable from ldapsearch. druid.auth.authenticatorChain=["ldap"] druid.auth.basic.ssl.trustStorePath=/usr/local/druid-path/certs/truststore.jks druid.auth.basic.ssl.protocol=tls druid.auth.basic.ssl.trustStorePassword=xxxxxx druid.auth.authenticator.ldap.type=basic druid.auth.authenticator.ldap.enableCacheNotifications=true druid.auth.authenticator.ldap.credentialsValidator.type=ldap druid.auth.authenticator.ldap.credentialsValidator.url=ldaps://ldapurl.domain:636 druid.auth.authenticator.ldap.credentialsValidator.bindUser=xxxxx druid.auth.authenticator.ldap.credentialsValidator.bindPassword=xxxxxxxxxx druid.auth.authenticator.ldap.credentialsValidator.baseDn=dc=xxxx,dc=xxxxxx,dc=xxxxx druid.auth.authenticator.ldap.credentialsValidator.userSearch=(cn=%s) druid.auth.authenticator.ldap.credentialsValidator.userAttribute=cn druid.auth.authenticator.ldap.authorizerName=ldapauth druid.escalator.type=basic druid.escalator.internalClientUsername=xxxxx druid.escalator.internalClientPassword=xxxxxxxx druid.escalator.authorizerName=ldapauth druid.auth.authorizers=["ldapauth"] druid.auth.authorizer.ldapauth.type=basic druid.auth.authorizer.ldapauth.initialAdminUser=xxxx druid.auth.authorizer.ldapauth.initialAdminRole=admin druid.auth.authorizer.ldapauth.roleProvider.type=ldap -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
