[ https://issues.apache.org/jira/browse/DERBY-857?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12535642 ]
Daniel John Debrunner commented on DERBY-857: --------------------------------------------- How about just removing the code, since it's just sanity and isn't really a benefit? Or just catching the security exception and continuing? I think the code was probably put there during the original development of LDAP authentication, I doubt it's needed now. > LDAP user authentication fails under a security manager > ------------------------------------------------------- > > Key: DERBY-857 > URL: https://issues.apache.org/jira/browse/DERBY-857 > Project: Derby > Issue Type: Bug > Components: Security > Affects Versions: 10.0.2.0, 10.0.2.1, 10.1.1.0, 10.1.2.1, 10.2.1.6 > Reporter: Daniel John Debrunner > Assignee: Kathey Marsden > > Running the test jdbcapi/secureUsers1.sql with a security manager results in: > > ERROR 08004: Connection refused : javax.naming.CommunicationException: > > noSuchMachine:389 [Root exception is java.security.AccessControlException: > > access denied (java.net.SocketPermission noSuchMachine resolve)] > Adding this permission to the policy file has no effect. which means a priv > block is required around the LDAP call. > permission java.net.SocketPermission "noSuchMachine", "resolve"; -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.