Something I ran across last night as I was setting up one of my co-workers to
start playing with the new WUP2K5-SP1 installation I'm evaluating, is that even
though I set the user up for LDAP and the LDAP "test" succeeded (No DN setting
BTW per an earlier posted message from another user on how to get it working
since I was beating my head against the wall), is that my co-worker used his PW
that I gave him for WUG instead of his normal network password and it
authenticated him in with the rights that the account has (in this case
read-only to group and devices). After being surprised by this, I then asked
him to purposefully use a bogus password (gibberish like
"jhdfaosaglivkbxfiu98726e4jm"), and it still authenticated him in.... I just
now checked it using the TEST button and my normal network user logon name and
was able to duplicate the same results ("Please enter the Authorize DN." in RED
and "Test Succeeded. These settings have been saved. " in green right below it).
Anyone else see this kind of behavior in their WEB Interface LDAP
configuration? Is this a bug in the software or do I have something so
seriously mis-configured that I'm leaving a security hole open into this NMS
when configured for LDAP authentication?? I've temporarily disabled LDAP on
the WUP accounts for now to remove this apparent security hole....
Anyone else get their LDAP configuration working properly (secured or
unsecured) for the WEB interface (We use eDIR LDAP from NOVELL)?? Help!!!
------------------------------------------------------------
Bryan Harrell, SPII
Network Infrastructure - Tallahassee
Fla. Dept of Revenue
(850)-921-0700 SunCom 291-0700
------------------------------------------------------------
Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.
An Archive of this list is available at:
http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/