[ http://jira.codehaus.org/browse/CONTINUUM-2576?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Brett Porter updated CONTINUUM-2576: ------------------------------------ Fix Version/s: 1.4.1 (Beta) > xmlrpc with ldap authentication > -------------------------------- > > Key: CONTINUUM-2576 > URL: http://jira.codehaus.org/browse/CONTINUUM-2576 > Project: Continuum > Issue Type: Bug > Components: Security, XMLRPC Interface > Affects Versions: 1.3.6 > Environment: continuum 136 > mysql > linux > java 1.6 > Reporter: Luca > Fix For: 1.4.1 (Beta) > > > We have an xmlrpc client, using continuum with default authentication all > works well. > if we enable ldap authentication, the xmlrpc client works, but for each > action continuum seems to make a mixed auth with standard and ldap. For each > remote call the failed auth count is increased and the user became locked. > in the fact we have the user remoteuser in old user database and in ldap with > different password. Continuum checks both database and ldap. If we set the > user password in db the same of ldap then works. > 2010-10-25 14:21:06,191 [TP-Processor24] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Searching for users with filter: > '(&(objectClass=user)(sAMAccountName=remoteuser))' from base dn: dc=prov,dc=bz > 2010-10-25 14:21:06,199 [TP-Processor24] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Found user?: true > 2010-10-25 14:21:06,200 [TP-Processor24] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Attempting Authenication: + CN=remoteuser,OU=9.1,OU=9,OU=Central > Administration,OU=prov.bz,DC=prov,DC=bz > 2010-10-25 14:21:06,211 [TP-Processor24] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))' > from base dn: dc=prov,dc=bz > 2010-10-25 14:21:06,217 [TP-Processor24] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for user: remoteuser > 2010-10-25 14:21:06,217 [TP-Processor24] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))' > from base dn: dc=prov,dc=bz > 2010-10-25 14:21:06,265 [TP-Processor24] INFO > net.sf.dozer.util.mapping.util.CustomMappingsLoader - Using the following > xml files to load custom mappings for the bean mapper instance: > [dozerBeanMapping.xml] > 2010-10-25 14:21:06,266 [TP-Processor24] INFO > net.sf.dozer.util.mapping.util.CustomMappingsLoader - Trying to find xml > mapping file: dozerBeanMapping.xml > 2010-10-25 14:21:06,268 [TP-Processor24] INFO > net.sf.dozer.util.mapping.util.CustomMappingsLoader - Using URL > [jar:file:/opt/egovapps/continuum-1.3.6/WEB-INF/lib/continuum-xmlrpc-server-1.3.6.jar!/dozerBeanMapping.xml] > to load custom xml mappings > 2010-10-25 14:21:06,330 [TP-Processor24] INFO > net.sf.dozer.util.mapping.util.CustomMappingsLoader - Successfully loaded > custom xml mappings from URL: > [jar:file:/opt/egovapps/continuum-1.3.6/WEB-INF/lib/continuum-xmlrpc-server-1.3.6.jar!/dozerBeanMapping.xml] > 2010-10-25 14:21:08,752 [TP-Processor21] WARN > org.codehaus.plexus.redback.authentication.users.UserManagerAuthenticator - > Password is Invalid for user remoteuser. > 2010-10-25 14:21:08,758 [TP-Processor21] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Searching for users with filter: > '(&(objectClass=user)(sAMAccountName=remoteuser))' from base dn: dc=prov,dc=bz > 2010-10-25 14:21:08,765 [TP-Processor21] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Found user?: true > 2010-10-25 14:21:08,765 [TP-Processor21] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Attempting Authenication: + CN=remoteuser,OU=9.1,OU=9,OU=Central > Administration,OU=prov.bz,DC=prov,DC=bz > 2010-10-25 14:21:08,775 [TP-Processor21] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))' > from base dn: dc=prov,dc=bz > 2010-10-25 14:21:08,780 [TP-Processor21] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for user: remoteuser > 2010-10-25 14:21:08,780 [TP-Processor21] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))' > from base dn: dc=prov,dc=bz > 2010-10-25 14:21:08,798 [TP-Processor20] WARN > org.codehaus.plexus.redback.authentication.users.UserManagerAuthenticator - > Password is Invalid for user remoteuser. > 2010-10-25 14:21:08,801 [TP-Processor20] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Searching for users with filter: > '(&(objectClass=user)(sAMAccountName=remoteuser))' from base dn: dc=prov,dc=bz > 2010-10-25 14:21:08,807 [TP-Processor20] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Found user?: true > 2010-10-25 14:21:08,807 [TP-Processor20] INFO > org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator - > Attempting Authenication: + CN=remoteuser,OU=9.1,OU=9,OU=Central > Administration,OU=prov.bz,DC=prov,DC=bz > 2010-10-25 14:21:08,818 [TP-Processor20] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))' > from base dn: dc=prov,dc=bz > 2010-10-25 14:21:08,823 [TP-Processor20] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for user: remoteuser > 2010-10-25 14:21:08,823 [TP-Processor20] INFO > org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching > for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))' > from base dn: dc=prov,dc=bz -- This message is automatically generated by JIRA. - If you think it was sent incorrectly contact one of the administrators: http://jira.codehaus.org/secure/Administrators.jspa - For more information on JIRA, see: http://www.atlassian.com/software/jira