Oops, forgot to add that I can do a command line query and get
attributes as the uid "qmail" with its password "qmailsecret":
Radish# ldapsearch -D "cn=qmail,ou=Headquarters,o=National Aeronautics and Space
Administration,c=US" -w 'qmailsecret' -x -b "ou=Headquarters,o=National Aeronautics
and Space Administration,c=US" '(&(objectclass=qmailuser)(uid=cshenton))'
version: 2
#
# filter: (&(objectclass=qmailuser)(uid=cshenton))
# requesting: ALL
#
# cshenton, accounts, Headquarters, National Aeronautics and Space Administra
tion, US
dn: uid=cshenton,ou=accounts,ou=Headquarters,o=National Aeronautics and Space
Administration,c=US
cn: Chris Shenton
cn: Chris S Shenton
sn: Shenton
objectClass: top
objectClass: person
objectClass: inetOrgPerson
objectClass: qmailUser
mail: [EMAIL PROTECTED]
mailHost: Radish.saic.hq.nasa.gov
mailMessageStore: cshenton
uid: cshenton
accountStatus: enabled
mailAlternateAddress: [EMAIL PROTECTED]
mailAlternateAddress: [EMAIL PROTECTED]
userPassword:: e1NTSEF9bWp1ZmgwUU1uSlBSeWkzN1ZSTjE1VUhPcFdjMkpma0g=
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
If I run that BASE64-encoded userPassword through a decoder I get:
{SSHA}mjufh0QMnJPRyi37VRN15UHOpWc2JfkH
And I'm not sure if I can go anywhere from here.
Thanks.