Gil Br (2014-10-28 15:58):
All,
I installed the latest LDAP Plugin for Jenkins.
When I use ldap://server.name I get *no* error under the LDAP Server
line, however when I use ldap*s*://server.name:636 I get the following
error:
/Unable to connect to ldaps://server.name:636 :
javax.naming.CommunicationException: simple bind failed:
server.name:636 [Root exception is
javax.net.ssl.SSLHandshakeException:
sun.security.validator.ValidatorException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to
find valid certification path to requested target]//
//
//[...]/
Most probably your LDAP uses a certifacte that is not valid on Jenkins
box. This is when you have a self generated certificate. You would
probably have to install CA on your Jenkins box.
In either case (ldaps or ldap) I get login failed when I try to login
with my NT user/password, Jenkins runs on windows.
I haven't tried using ldap protocol in server address but that should
work for Active Directory LDAP:
* server: your.domain.com
* rootDN: DC=your,DC=domain,DC=com
* userSearchBase: CN=Users
* user search filter: sAMAccountName={0}
* managerDN: DOMAIN\someUser
* managerPassword: someUser password
AFAIK `userSearchBase` and `user search filter` are the same for all
Active Directory installations.
Regards,
Nux
--
You received this message because you are subscribed to the Google Groups "Jenkins
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.