[ 
https://issues.apache.org/jira/browse/OPENMEETINGS-964?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14029693#comment-14029693
 ] 

Brad A LeBlanc commented on OPENMEETINGS-964:
---------------------------------------------

Would having a "disable autocreate" flag have value?  For example, I have 
several applications that I use to the LDAP to authenticate, but I use the 
internal DB to authorize.  If the system 
didn't automatically publish new users into the database, that could be one 
more layer preventing unauthorized access.  This allows the application 
administrator to populate the internal database to grant access to the system, 
but still use the LDAP for the authentication process.

If an entity chose to make their system fully accessible to all authenticated 
users, they would just leave the flag commented out.

I was looking at the commented field that you sent:

public static final String CONFIGKEY_LDAP_USER_EXTRAFILTER = 
"ldap_user_extrafilter";

Depending on the flexibility of the options in the filter, aka group 
membership, attribute, it would open the authorization model to be stored in 
the LDAP directory.  Application Administrators would use the LDAP database to 
secure the application.  But I don't see applications moving into that 
direction.  The heterogeneous environments have most of us using the LDAP 
system for authentication and distributing the application management 
responsibilities to non-sysadmin users.  One notable exception at my site would 
be the apps that deeply integrate into the directory structure, for example, 
Microsoft server solutions and Active Directory.  Even then, we have 
implemented their identity portal suite to pass off user group management to 
the respective owners.

> LDAP login should be refactored
> -------------------------------
>
>                 Key: OPENMEETINGS-964
>                 URL: https://issues.apache.org/jira/browse/OPENMEETINGS-964
>             Project: Openmeetings
>          Issue Type: Task
>          Components: LDAP
>    Affects Versions: 3.0.0
>            Reporter: Maxim Solodovnik
>            Assignee: Maxim Solodovnik
>             Fix For: 3.1.0
>
>
> Detailed description is here OPENMEETINGS-943
> The correct way to handle this:
> First:
> if bind_dn and bind_pwd are set, first conect to the LDAP directory with 
> these credentials
> if empty, then just use an nonymous bind to the directory
> Then
> if OM is set to AuthLDAP=NONE, just use the connection to retrieve 
> informations from the directory
> -if OM is set to AuthLDAP=OPENLDAP (should be SEARCHANDBIND actually), search 
> for the userDN and then perform a bind to the directory with userDN/provided 
> PWD
> if OM is set to AuthLDAP=SIMPLEBIND, construct the userDN from the username, 
> the user attribute (for instance cn or uid), and the userBase, and then 
> perform a bind with userDN and provided PWD
> if OM is set to AuthLDAP=SIMPLE (to be backward compliant), let's try a bind 
> with the provided user/password



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to