Something I ran across last night as I was setting up one of my co-workers to 
start playing with the new WUP2K5-SP1 installation I'm evaluating, is that even 
though I set the user up for LDAP and the LDAP "test" succeeded (No DN setting 
BTW per an earlier posted message from another user on how to get it working 
since I was beating my head against the wall), is that my co-worker used his PW 
that I gave him for WUG instead of his normal network password and it 
authenticated him in with the rights that the account has (in this case 
read-only to group and devices). After being surprised by this, I then asked 
him to purposefully use a bogus password (gibberish like 
"jhdfaosaglivkbxfiu98726e4jm"), and it still authenticated him in.... I just 
now checked it using the TEST button and my normal network user logon name and 
was able to duplicate the same results ("Please enter the Authorize DN." in RED 
and "Test Succeeded. These settings have been saved. " in green right below it).

Anyone else see this kind of behavior in their WEB Interface LDAP 
configuration? Is this a bug in the software or do I have something so 
seriously mis-configured that I'm leaving a security hole open into this NMS 
when configured for LDAP authentication??  I've temporarily disabled LDAP on 
the WUP accounts for now to remove this apparent security hole....

Anyone else get their LDAP configuration working properly (secured or 
unsecured) for the WEB interface (We use eDIR LDAP from NOVELL)?? Help!!!



------------------------------------------------------------
Bryan Harrell, SPII 
Network Infrastructure - Tallahassee
Fla. Dept of Revenue
(850)-921-0700  SunCom 291-0700
------------------------------------------------------------



Please visit http://www.ipswitch.com/support/mailing-lists.html
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/whatsup_forum%40list.ipswitch.com/

Reply via email to