Michael created CLOUDSTACK-9810:
-----------------------------------
Summary: Cloudstack Ldap user fails to authenticate
Key: CLOUDSTACK-9810
URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9810
Project: CloudStack
Issue Type: Bug
Security Level: Public (Anyone can view this level - this is the default.)
Components: Management Server
Affects Versions: 4.9.2.0
Environment: CentOS 6.8
Reporter: Michael
I have a user that was previously able to login with LDAP authentication on
port 389. I'm using ldap.provider = openldap and restricting my search to a
group inside active directory specified in ldap.search.group.principle
Anyway, the user now reports that their no longer able to login. I didn't find
any errors on the management server's log and his credentials work for other
systems at our company. Is there some method to increase the verbose of the
management server log on this issue? I have ldap.rad.timeout set to 30000 and
ldap.request.page.size to 1000. Using active directory for authentication
against sAMAccountName for ldap.user.object=user.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)