This is an automated email from the ASF dual-hosted git repository. dahn pushed a commit to branch 4.19 in repository https://gitbox.apache.org/repos/asf/cloudstack-documentation.git
The following commit(s) were added to refs/heads/4.19 by this push: new 1f26c59 Add LDAP upgrade instructions from users coming from 4.19.0 (#408) 1f26c59 is described below commit 1f26c59310ffff1a1d41e93a037d0b518fb84569 Author: Bryan Lima <42067040+bryanml...@users.noreply.github.com> AuthorDate: Fri Jun 21 07:20:04 2024 -0300 Add LDAP upgrade instructions from users coming from 4.19.0 (#408) --- source/releasenotes/about.rst | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/source/releasenotes/about.rst b/source/releasenotes/about.rst index 52eb766..3b57dbb 100644 --- a/source/releasenotes/about.rst +++ b/source/releasenotes/about.rst @@ -118,3 +118,17 @@ After identifying the snapshots with a backing store and the related templates, .. parsed-literal:: qemu-img convert -O qcow2 -U --image-opts driver=qcow2,file.filename=<path to snapshot on secondary storage> <path to snapshot on secondary storage>-converted + +Issue regarding LDAP authentication on version 4.19.0 +===================================================== + +In version 4.19.0, the encryption of scoped configurations of Accounts and Domains was changed to only encrypt if there were sensitive data (e.g, they belonged to the Hidden or Secure category) as all configurations for Accounts and Domains were encrypted in previous versions. However, when using the encrypted values from these scopes, ACS did not correctly decrypt these values. For this reason, a simple solution was to update these configurations to their plain values with manual DB int [...] + +This issue has been fixed in Apache CloudStack 4.19.1.0. However, for users that manually set the configurations ``ldap.bind.password`` and ``ldap.truststore.password`` to a plain value in order to fix the faulty behaviour, it is required to store them encrypted after upgrading to version 4.19.1 and onwards. It will not be possible to update the configuration via UI, as an exception will be thrown when ACS tries to decrypt the plain value. To fix this, it is required to set the password [...] + +#. Manually set the configuration via CloudMonkey, for example ``update configuration domainid=<domain-uuid> name="ldap.bind.password" value="password"``; +#. Or, removing the defined configuration through the database via the query ``DELETE from cloud.domain_details WHERE name like "%ldap%password%"``, and setting the configuration via UI for the affected domains. + +After updating these configurations, LDAP authentication should be working as expected. + +.. _`#8637`: https://github.com/apache/cloudstack/pull/8637 \ No newline at end of file