I did not receive your patch but if you now do:

  auth.settings.login.methods=[ldap_login(..)]

then it does not store password in db and always requres ldap auth.
If you do:

  auth.settings.login.methods=[ldap_login(..), auth]

same as above but does store password in db.
if you do

  auth.settings.login.methods=[auth, ldap_login(..)]

tries to login locally first, else tries ldap.
Of course you can do

  auth.settings.login.methods=[auth, ldap_login(...), email_login
(...), basic_login(...)]

and combinations thereof.

Please give this a try.

Massimo







On Jun 10, 11:06 pm, "mr.freeze" <[email protected]> wrote:
> I just sent you another (very simple) patch that forces auth to use
> the alternative login methods if present so, for example, LDAP will be
> queried each time.
>
> On Jun 9, 11:30 pm, mdipierro <[email protected]> wrote:
>
> > Thanks!
>
> > On Jun 9, 11:03 pm, "mr.freeze" <[email protected]> wrote:
>
> > > Massimo, you should have a patch in email for active directory ldap
> > >auth.  As noted in my email:
> > > It works but we will also need to change tools.py so that it forces
> > > ldap authentication each time, not just the first (maybe track the
> > >authmethod in the db?).
> > > Currently after the account is authenticated through ldap, the
> > > credentials are stored in the db and ldap is never queried again.
>
> > > Also, ideally the login form would be specific to the theauthtype so
> > > ldap/active directory could include a domain name field.
> > > Then we can tackle an LDAP membership provider!
>
> > > On Jun 8, 11:52 pm, mdipierro <[email protected]> wrote:
>
> > > > only mode='uid' is implemented. I could use help debugging/
> > > > implementing the other modes
>
> > > > Massimo
>
> > > > On Jun 8, 10:38 pm, "mr.freeze" <[email protected]> wrote:
>
> > > > > Sorry, I saw 'raise SyntaxError, "Not yet implemented"' under the 'ad'
> > > > > and 'domino' if statements of ldap_auth_aux in ldap_auth.py and
> > > > > thought you weren't done.   I tried it and it seems that if ad/ldapis
> > > > > enabled that it will take any username with a blank password.
>
> > > > > On Jun 8, 10:04 pm, mdipierro <[email protected]> wrote:
>
> > > > > >ldapshould work already. Please test it.
>
> > > > > > On Jun 8, 9:29 pm, "mr.freeze" <[email protected]> wrote:
>
> > > > > > > Massimo, I can testldapagainst AD when it is finished.
>
> > > > > > > On May 13, 12:01 am, mdipierro <[email protected]> wrote:
>
> > > > > > > > Please try this....
>
> > > > > > > > 1) to authenticate with gmail
>
> > > > > > > >auth=Auth(globals(),db)
> > > > > > > > from gluon.contrib.login_methods.email_auth import email_auth
> > > > > > > >auth.settings.login_methods.append(email_auth())
>
> > > > > > > > 2) to authenticate using basic authentication of a third party 
> > > > > > > > server
>
> > > > > > > >auth=Auth(globals(),db)
> > > > > > > > from gluon.contrib.login_methods.basic_auth import basic_auth
> > > > > > > >auth.settings.login_methods.append(basic_auth('http://server'))
>
> > > > > > > > 3) to authenticate usingLDAP server
>
> > > > > > > >auth=Auth(globals(),db)
> > > > > > > > from gluon.contrib.login_methods.ldap_auth import ldap_auth
> > > > > > > >auth.settings.login_methods.append(ldap_auth(...))
>
> > > > > > > > (requiresldaplibrary installed. look into gluon/contrib/
> > > > > > > > login_methods/ldap_auth.py for ... options).
>
> > > > > > > > Please let me know if this works for you.
>
> > > > > > > > CAS client will be next....- Hide quoted text -
>
> > > > - Show quoted text -- Hide quoted text -
>
> > - Show quoted text -
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py Web Framework" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to