Michael created CLOUDSTACK-9810: ----------------------------------- Summary: Cloudstack Ldap user fails to authenticate Key: CLOUDSTACK-9810 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9810 Project: CloudStack Issue Type: Bug Security Level: Public (Anyone can view this level - this is the default.) Components: Management Server Affects Versions: 4.9.2.0 Environment: CentOS 6.8 Reporter: Michael
I have a user that was previously able to login with LDAP authentication on port 389. I'm using ldap.provider = openldap and restricting my search to a group inside active directory specified in ldap.search.group.principle Anyway, the user now reports that their no longer able to login. I didn't find any errors on the management server's log and his credentials work for other systems at our company. Is there some method to increase the verbose of the management server log on this issue? I have ldap.rad.timeout set to 30000 and ldap.request.page.size to 1000. Using active directory for authentication against sAMAccountName for ldap.user.object=user. -- This message was sent by Atlassian JIRA (v6.3.15#6346)