Humm,

I have the master of the mainline...what can I do? git pull origin master? 
Do you think this can help me?

Il giorno mercoledì 28 novembre 2012 16:33:40 UTC+1, Federico Don ha 
scritto:
>
> do you have the ultimate version for gitorious?
>
> I had this problem and when i update to version the problem was solved!
>
>
> 2012/11/28 Graziano Aliberti <[email protected] <javascript:>>
>
>> Hi,
>>
>> my issue is that I've never seen "All good, your credential are correct"
>>
>> Always 
>>
>> Not there yet.
>> For debugging purposes, this is the DN we tried: 
>> uid=MyUser,OU=Something,O=Something,C=it
>>
>> The user, obviously, exists
>>
>> Thank you,
>>
>> Graziano
>>
>> Il giorno mercoledì 28 novembre 2012 15:41:38 UTC+1, Federico Don ha 
>> scritto:
>>>
>>> Hello,
>>>
>>> if you run the script for test....
>>>
>>> [root@gitorious gitorious]# bundle exec script/test_ldap_connection USER 
>>> PASSWORD
>>> All good, your credentials are correct
>>>
>>> what is your issue??
>>>
>>>
>>> 2012/11/28 Graziano Aliberti <[email protected]>
>>>
>>>> Hi Federico,
>>>>
>>>> I've tried with your configuration (changing the server and the 
>>>> base_dn) but it doesn't work!
>>>>
>>>> This is my configuration:
>>>>
>>>>
>>>> production:
>>>>    disable_default: true
>>>>    methods:
>>>>       - adapter: Gitorious::Authentication::**LDAPAuthentication
>>>>         host: ldap.something.it
>>>>         port: 389
>>>>         base_dn: OU=Something,O=Something,C=it 
>>>>         attribute_mapping:  
>>>>         mail: email        
>>>>         login_attribute: uid
>>>>         encryption: none
>>>>
>>>> Il giorno venerdì 23 novembre 2012 20:30:59 UTC+1, Federico Don ha 
>>>> scritto:
>>>>>
>>>>> could you try with this setup?
>>>>>
>>>>> production:
>>>>>   disable_default: false
>>>>>   methods:
>>>>>     - adapter: Gitorious::Authentication::**LDA**PAuthentication
>>>>>       host: 172.17.195.115
>>>>>       port: 389 
>>>>>       base_dn: DC=example,DC=com       
>>>>>       bind_username: user_ldap_bind
>>>>>       bind_password: password_user_ldap_bind
>>>>>       user_filter: 
>>>>>       username_attribute: sAMAccountName
>>>>>       encryption: none
>>>>>       login_attribute: uid
>>>>>       distinguished_name_template: 
>>>>> "uid={},OU=users,DC=example,**DC**=com" 
>>>>>   
>>>>>       attribute_mapping:                           
>>>>>       mail: email
>>>>>
>>>>> I hope your comment!
>>>>>
>>>>> Regards,
>>>>>
>>>>>
>>>>> 2012/11/23 Graziano Aliberti <[email protected]>
>>>>>
>>>>>> How can I do that? I want just that only the authentication is handle 
>>>>>> by LDAP. 
>>>>>>
>>>>>> Il giorno venerdì 23 novembre 2012 15:13:42 UTC+1, anapsix ha scritto:
>>>>>>>
>>>>>>> I'm using Kerberos auth with our LDAP setup (openldap) and its 
>>>>>>> working great.. though you do need to edit the auth module code to 
>>>>>>> allow 
>>>>>>> for SSO.
>>>>>>
>>>>>>  -- 
>>>>>> To post to this group, send email to [email protected]
>>>>>> To unsubscribe from this group, send email to
>>>>>> gitorious+...@**googlegroups.com
>>>>>>
>>>>>
>>>>>  -- 
>>>> To post to this group, send email to [email protected]
>>>> To unsubscribe from this group, send email to
>>>> gitorious+...@**googlegroups.com
>>>>
>>>
>>>  -- 
>> To post to this group, send email to [email protected]<javascript:>
>> To unsubscribe from this group, send email to
>> [email protected] <javascript:>
>>
>
>

-- 
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]

Reply via email to