Michael created CLOUDSTACK-9810:
-----------------------------------

             Summary: Cloudstack Ldap user fails to authenticate
                 Key: CLOUDSTACK-9810
                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9810
             Project: CloudStack
          Issue Type: Bug
      Security Level: Public (Anyone can view this level - this is the default.)
          Components: Management Server
    Affects Versions: 4.9.2.0
         Environment: CentOS 6.8
            Reporter: Michael


I have a user that was previously able to login with LDAP authentication on 
port 389.  I'm using ldap.provider = openldap and restricting my search to a 
group inside active directory specified in ldap.search.group.principle

Anyway, the user now reports that their no longer able to login.  I didn't find 
any errors on the management server's log and his credentials work for other 
systems at our company.  Is there some method to increase the verbose of the 
management server log on this issue?  I have ldap.rad.timeout set to 30000 and 
ldap.request.page.size to 1000.  Using active directory for authentication 
against sAMAccountName for ldap.user.object=user.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to