hola,

the original reason for storing the ldap passwd locally (md5
encrypted) within OM is to be able to use openMeetings, even if ldap
server is maintained/off/not available...

-> i remember a post, somebody saying its sometimes hard to keep syncd
with the Ldap Directory Admin - i agree  with that ;-)
-> this is also the reason for storing the admins password locally  -
admin users should always be able to access OM, even if there are
compilations with the Ldap Directory Server...

Since its always the Ldappassword that has to be correct (in case Ldap
is configured) , its not really duplicated, but stored as fallback
(this is working without stopping OM Server).

The userdata should be updated on every successful login , so the db
passwd should also always be in sync with the Ldap server. (The only
scenario it would fail would be, if LDAP password changes and ldap
server is off/not configured in OM, so the local password wouldn't
match the current DB password - but coding the fallback for the
fallback is not my flavour ;-))

i dont think i understand the  random passowrd bypass via config  -how
would a OM user authenticate, if Ldap  server is off?


see ya

Smoeker

On 15 Apr., 13:51, t.lem...@gmail.com wrote:
> Hi,
>
> While reviewing the ldap authentication module, I found out that once
> authenticated, OM records and updates the user's password in its
> internal DB.
> Why is that ?
>
> In LdapLoginManagement.java:  in method doLdapLogin
>           // Update password (could have changed in LDAP)
>           u.setPassword(passwd);
>
> Since all authentications are done on the LDAP server, I think it is a
> bad idea to duplicate the password in OM internal DB.
>
> Is there another good reason to do this ?
>
> The only reason I see so far is that in MainService, the loginUser
> method fails back to non LDAP authentication if the user has admin
> privileges. This also means that even if the user changes his password
> in LDAP, his old password recorded to the OM db must be used...
>
> I think it would be better:
> * to set a random password value in the OM's Users tables for the Ldap users
> * set a new parameter in om_ldap that will list admin users for which
> LDAP auth must be bypassed (in order to keep a local admin login even if
> LDAP is badly configured or unavailable).
>
> What do you think ?
>
> Thibault

-- 
You received this message because you are subscribed to the Google Groups 
"OpenMeetings User" group.
To post to this group, send email to openmeetings-u...@googlegroups.com.
To unsubscribe from this group, send email to 
openmeetings-user+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/openmeetings-user?hl=en.

Reply via email to