[
http://jira.codehaus.org/browse/CONTINUUM-2576?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Brett Porter updated CONTINUUM-2576:
------------------------------------
Fix Version/s: 1.4.1 (Beta)
> xmlrpc with ldap authentication
> --------------------------------
>
> Key: CONTINUUM-2576
> URL: http://jira.codehaus.org/browse/CONTINUUM-2576
> Project: Continuum
> Issue Type: Bug
> Components: Security, XMLRPC Interface
> Affects Versions: 1.3.6
> Environment: continuum 136
> mysql
> linux
> java 1.6
> Reporter: Luca
> Fix For: 1.4.1 (Beta)
>
>
> We have an xmlrpc client, using continuum with default authentication all
> works well.
> if we enable ldap authentication, the xmlrpc client works, but for each
> action continuum seems to make a mixed auth with standard and ldap. For each
> remote call the failed auth count is increased and the user became locked.
> in the fact we have the user remoteuser in old user database and in ldap with
> different password. Continuum checks both database and ldap. If we set the
> user password in db the same of ldap then works.
> 2010-10-25 14:21:06,191 [TP-Processor24] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Searching for users with filter:
> '(&(objectClass=user)(sAMAccountName=remoteuser))' from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:06,199 [TP-Processor24] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Found user?: true
> 2010-10-25 14:21:06,200 [TP-Processor24] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Attempting Authenication: + CN=remoteuser,OU=9.1,OU=9,OU=Central
> Administration,OU=prov.bz,DC=prov,DC=bz
> 2010-10-25 14:21:06,211 [TP-Processor24] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))'
> from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:06,217 [TP-Processor24] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for user: remoteuser
> 2010-10-25 14:21:06,217 [TP-Processor24] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))'
> from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:06,265 [TP-Processor24] INFO
> net.sf.dozer.util.mapping.util.CustomMappingsLoader - Using the following
> xml files to load custom mappings for the bean mapper instance:
> [dozerBeanMapping.xml]
> 2010-10-25 14:21:06,266 [TP-Processor24] INFO
> net.sf.dozer.util.mapping.util.CustomMappingsLoader - Trying to find xml
> mapping file: dozerBeanMapping.xml
> 2010-10-25 14:21:06,268 [TP-Processor24] INFO
> net.sf.dozer.util.mapping.util.CustomMappingsLoader - Using URL
> [jar:file:/opt/egovapps/continuum-1.3.6/WEB-INF/lib/continuum-xmlrpc-server-1.3.6.jar!/dozerBeanMapping.xml]
> to load custom xml mappings
> 2010-10-25 14:21:06,330 [TP-Processor24] INFO
> net.sf.dozer.util.mapping.util.CustomMappingsLoader - Successfully loaded
> custom xml mappings from URL:
> [jar:file:/opt/egovapps/continuum-1.3.6/WEB-INF/lib/continuum-xmlrpc-server-1.3.6.jar!/dozerBeanMapping.xml]
> 2010-10-25 14:21:08,752 [TP-Processor21] WARN
> org.codehaus.plexus.redback.authentication.users.UserManagerAuthenticator -
> Password is Invalid for user remoteuser.
> 2010-10-25 14:21:08,758 [TP-Processor21] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Searching for users with filter:
> '(&(objectClass=user)(sAMAccountName=remoteuser))' from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:08,765 [TP-Processor21] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Found user?: true
> 2010-10-25 14:21:08,765 [TP-Processor21] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Attempting Authenication: + CN=remoteuser,OU=9.1,OU=9,OU=Central
> Administration,OU=prov.bz,DC=prov,DC=bz
> 2010-10-25 14:21:08,775 [TP-Processor21] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))'
> from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:08,780 [TP-Processor21] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for user: remoteuser
> 2010-10-25 14:21:08,780 [TP-Processor21] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))'
> from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:08,798 [TP-Processor20] WARN
> org.codehaus.plexus.redback.authentication.users.UserManagerAuthenticator -
> Password is Invalid for user remoteuser.
> 2010-10-25 14:21:08,801 [TP-Processor20] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Searching for users with filter:
> '(&(objectClass=user)(sAMAccountName=remoteuser))' from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:08,807 [TP-Processor20] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Found user?: true
> 2010-10-25 14:21:08,807 [TP-Processor20] INFO
> org.codehaus.plexus.redback.authentication.ldap.LdapBindAuthenticator -
> Attempting Authenication: + CN=remoteuser,OU=9.1,OU=9,OU=Central
> Administration,OU=prov.bz,DC=prov,DC=bz
> 2010-10-25 14:21:08,818 [TP-Processor20] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))'
> from base dn: dc=prov,dc=bz
> 2010-10-25 14:21:08,823 [TP-Processor20] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for user: remoteuser
> 2010-10-25 14:21:08,823 [TP-Processor20] INFO
> org.codehaus.plexus.redback.users.ldap.ctl.DefaultLdapController - Searching
> for users with filter: '(&(objectClass=user)(sAMAccountName=remoteuser))'
> from base dn: dc=prov,dc=bz
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
http://jira.codehaus.org/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira