On 26 Jan 2010, at 4:44 AM, Eric Covener wrote:

This new behaviour covers the two use cases described above (even though I did
not check it in an Active Directory setup).

Patch is nice and simple, but it would be great if someone with AD
leanings could confirm that this combination of HTTP username,
attribute, and basedn is likely to result in something that can bind
in a typical AD install.

There are three possible scenarios for login:

- User provides username, auth_ldap server does a search within the directory to find the DN corresponding to the username, and then attempts to bind as that DN. If it succeeds, you're in. This usually requires a DN of some kind to use to do the initial login to do the original search. (AD works fine in this scenario, on condition you have an account to bind and do the initial search with).

- User provides username, auth_ldap applies the username to an admin- provided recipe of some kind to create the DN. This recipe needs to be flexible enough to support various scenarios, such as the base URL for the recipe being something other than the base URL for searches (think group searches, a group might not have the same base DN as the person).

- User provides username, auth_ldap tries to bind directly with that username without first converting it to a DN. This is how AD would work.

Ideally auth_ldap should support the above three methods, am I correct in understanding that the patch implements the second option above? (I don't have time to review it fully at the moment).

Regards,
Graham
--

Reply via email to