Hi,

I've not been able to trace down a very strange problem, and I'm hoping that someone here might be able to provide some insight and/or ideas.

I explained some of this in an earlier post, but basically, I have a webapp that uses the LDAPJDK to access Active Directory. As part of what this webapp does, it establishes a LDAP connection to AD, then authenticates on the LDAPConnection with an admin username/password.

We had installed this webapp at several sites successfully, and at those previous sites, we had always configured the webapp to use an admin username with a "UPN formatted username", e.g., "[EMAIL PROTECTED]".

However, at this one site where I'm having a problem, we had a problem with the admin username authenticating (ld.authenticate()), and I finally got it working by changing the configured admin username to a full DN-formatted username (cn=admin,cn=users,dc=foo,dc=com).

I've been trying to figure out why this was necessary just in this one installation for a couple of weeks now, and at this point, am totally stuck :(...

Some additional "symptoms" are that at this one site, we can successfully authenticate using the UPN-formatted username using standard tools such as ldifde.exe and ldapsearch. It's just my webapp that doesn't want to seem to work with UPN formatted usernames.

I'd be thinking that there must be some problem with my webapp, but this problem is only occurring at just at this one site, and we are using the same webapp/code at all the sites (with the same LDAPJDK version).

I've also been reviewing the AD and its contents, thinking that there may be something wrong with it. I was able to come up with some scenarios that would cause an authentication with a UPN formatted username to fail (e.g., having two users with the same userPrincipalName attribute), but with these scenarios, authentication with ldifde/ldapsearch will ALSO fail, so they don't completely duplicate the problem we are seeing onsite.

I went onsite today, and wrote a small Java program (again, using the same LDAPJDK) that simply does a LDAP connection then ld.authenticate(), and, if I use the same UPN-formatted username with my small Java webapp, it authenticates fine with the same UPN-formatted username with which my webapp fails to authenticate.

So, again, this seems to point to something wrong in my webapp, but, again, this webapp works fine with the UPN-formatted usernames at the other sites, plus, I have debug code in my webapp, and log the parameters to ld.authenticate() and everything looks ok.

Now, one of the things that I've noted is that there is something not "normal" with the AD at this one site: The root (top-level) of it's domain name is not one of the "normal" top-level domains. This is a kind of testbed site, so I think that whoever installed the AD decided that it should have a domain name like "foo.foo1" (literally), instead of something like "foo.com" or "foo.org", etc.

So, per the Subject, the question that I have is: Is there anything in the LDAPJDK that would relies on the domain suffix, or maybe the top-level domain in the domain suffix being a "normal" top-level domain name?

Sorry for the long post :(!!

Thanks in advance,
Jim
_______________________________________________
dev-tech-ldap mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-ldap

Reply via email to