hotani wrote:
http://peeved.org/blog/2007/11/20/
BTW: This blog entry claims that LDAP_SERVER_DOMAIN_SCOPE_OID control
cannot be used with python-ldap. But support for such simple LDAPv3
extended controls was added to python-ldap way back in 2005.
Actually it's easy (relevant code
hotani wrote:
Thanks for the response. The user I'm connecting as should have full
access but I'll double check tomorrow.
This is the LDAP error that is returned when I leave out the OU:
{'info': ': LdapErr: DSID-0C090627, comment: In order to
perform this operation a successful bind
It seems the only way I can bind is by using this format:
simple_bind_s('[EMAIL PROTECTED]','password')
If I try using a DN, it fails every time. This will not work:
simple_bind_s('cn=user,dc=server,dc=local', 'password')
Errors out with invalid credentials: ldap.INVALID_CREDENTIALS:
{'info':
This fixed it!
http://peeved.org/blog/2007/11/20/
By adding this line after 'import ldap', I was able to search from the
root level:
ldap.set_option(ldap.OPT_REFERRALS, 0)
--
http://mail.python.org/mailman/listinfo/python-list
hotani wrote:
This fixed it!
http://peeved.org/blog/2007/11/20/
By adding this line after 'import ldap', I was able to search from the
root level:
ldap.set_option(ldap.OPT_REFERRALS, 0)
Uumh, yes. I'm always switching off OpenLDAP client lib's internal
referral chasing.
But be prepared to
hotani wrote:
It seems the only way I can bind is by using this format:
simple_bind_s('[EMAIL PROTECTED]','password')
Believe me: This is not true.
If I try using a DN, it fails every time. This will not work:
simple_bind_s('cn=user,dc=server,dc=local', 'password')
Check the DN you're
I am attempting to pull info from an LDAP server (Active Directory),
but cannot specify an OU. In other words, I need to search users in
all OU's, not a specific one.
Here is what works:
con = ldap.initialize(ldap://server.local;)
con.simple_bind_s('[EMAIL PROTECTED]', pass)
result =
hotani wrote:
I am attempting to pull info from an LDAP server (Active Directory),
but cannot specify an OU. In other words, I need to search users in
all OU's, not a specific one.
If the user you're binding with has the right in AD to search the whole
subtree you can start searching at the
Thanks for the response. The user I'm connecting as should have full
access but I'll double check tomorrow.
This is the LDAP error that is returned when I leave out the OU:
{'info': ': LdapErr: DSID-0C090627, comment: In order to
perform this operation a successful bind must be