Gil Br (2014-10-28 15:58):
All,

I installed the latest LDAP Plugin for Jenkins.
When I use ldap://server.name I get *no* error under the LDAP Server line, however when I use ldap*s*://server.name:636 I get the following error: /Unable to connect to ldaps://server.name:636 : javax.naming.CommunicationException: simple bind failed: server.name:636 [Root exception is javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target]//
//
//[...]/

Most probably your LDAP uses a certifacte that is not valid on Jenkins box. This is when you have a self generated certificate. You would probably have to install CA on your Jenkins box.

In either case (ldaps or ldap) I get login failed when I try to login with my NT user/password, Jenkins runs on windows.

I haven't tried using ldap protocol in server address but that should work for Active Directory LDAP:

    * server: your.domain.com
    * rootDN: DC=your,DC=domain,DC=com
    * userSearchBase: CN=Users
    * user search filter: sAMAccountName={0}
    * managerDN: DOMAIN\someUser
    * managerPassword: someUser password

AFAIK `userSearchBase` and `user search filter` are the same for all Active Directory installations.

Regards,
Nux

--
You received this message because you are subscribed to the Google Groups "Jenkins 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to