As of now the LDAP configuration is global.
A configuration specific to domain or an account can also be added, this
not there ATM. Do propose this enhancement.
-abhi
On 01/03/13 2:03 AM, "Clayton Weise" wrote:
>The documentation on this is ambiguous at best. They provide
>instructions on how
Bring this to the doc sprint tomorrow :)
-Kelcey
>-Original Message-
>From: Clayton Weise [mailto:cwe...@iswest.net]
>Sent: Thursday, February 28, 2013 12:34 PM
>To: cloudstack-dev@incubator.apache.org
>Subject: LDAP Auth
>
>The documentation on this is amb
The documentation on this is ambiguous at best. They provide instructions on
how to configure LDAP but not the scope of users/accounts that it encompasses.
Is an LDAP configuration global? Or is there a way to associate with a specific
domain and/or account? Would it be possible to have multi
ster: 2b267c1ceb898564bbf60bec161739bc8ae6f6d9
4.1: 07fa69cac5c54da1d5f9a829a1524b2133bd51da
> Testing LDAP Auth Failed - due to "%" being illegal character in queryfilter
>
>
>
at I was the one who fix the issue. Let me get rid
of the redudant code as well.
Thanks Mice.
> Testing LDAP Auth Failed - due to "%" being illegal character in queryfilter
>
>
>
are already decoded in line APIServer.java 267:
paramList = URLEncodedUtils.parse(new URI(request.getRequestLine().getUri()),
"UTF-8");
so i changed handleRequest's parameter to 'false' (no need to decode again)
> Testing LDAP Auth Failed - due t
096 (or integration port) ApiServer calls handleRequest with the boolean
enabled.
Should we assume that whatever comes on port 8096 has its key value pairs
fixed? I don't know what should be the best fix.
> Testing LDAP Auth Failed - due to "%" b
this out tomorrow and let you know if it worked.
> Testing LDAP Auth Failed - due to "%" being illegal character in queryfilter
>
>
> Key: CLOUDSTACK-1142
&g
Thanks Mice,
I will try this out tomorrow and let you know if it worked.
-Original Message-
From: Mice Xia (JIRA) [mailto:j...@apache.org]
Sent: Monday, February 04, 2013 10:28 PM
To: cloudstack-dev@incubator.apache.org
Subject: [jira] [Resolved] (CLOUDSTACK-1142) Testing LDAP Auth
ad294c6c17ca702a5
4.1: dcb2e5a8ed750af483d28963f3cf97b6bad70239
> Testing LDAP Auth Failed - due to "%" being illegal character in queryfilter
>
>
> Key: CLOUDSTACK-1142
>
[
https://issues.apache.org/jira/browse/CLOUDSTACK-1142?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Mice Xia reassigned CLOUDSTACK-1142:
Assignee: Mice Xia
> Testing LDAP Auth Failed - due to "%"
[
https://issues.apache.org/jira/browse/CLOUDSTACK-1142?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
David Nalley updated CLOUDSTACK-1142:
-
Component/s: API
> Testing LDAP Auth Failed - due to "%"
[
https://issues.apache.org/jira/browse/CLOUDSTACK-1142?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
David Nalley updated CLOUDSTACK-1142:
-
Priority: Blocker (was: Critical)
> Testing LDAP Auth Failed - due
h means if you try to configure your ldap in 4.1 - it will fail -
the same way it failed for me.
Please try for 4.1
Thanks
ilya
> Testing LDAP Auth Failed - due to "%" being i
pecial chars are url encoded **
4) change sharedFunction.js
- var md5Hashed = true;
+ var md5Hashed = false;
4) login in UI with AD password
> Testing LDAP Auth Failed - due to "%" being illegal character in queryfilter
> --
eans cloudstack accepts the ldapconfig command,
however, ldap auth is broken.
> Testing LDAP Auth Failed - due to "%" being illegal character in queryfilter
>
>
>
ilya musayev created CLOUDSTACK-1142:
Summary: Testing LDAP Auth Failed - due to "%" being illegal
character in queryfilter
Key: CLOUDSTACK-1142
URL: https://issues.apache.org/jira/browse/CLOUD
October 30, 2012 7:24 PM
> To: cloudstack-dev@incubator.apache.org
> Subject: RE: [REVIEW] MS LDAP Auth patch - UI CSS and Architecture help
> needed
>
> Chiradeep,
>
> I take it back,
>
> Just looked at what Hugo proposed on commits, if we use SHA256 vs MD5 - it
> wi
: cloudstack-dev@incubator.apache.org
Subject: RE: [REVIEW] MS LDAP Auth patch - UI CSS and Architecture help needed
Chiradeep,
If we have a failback mechanism I mentioned earlier - it should not.
Regards
Ilya
-Original Message-
From: Chiradeep Vittal [mailto:chiradeep.vit...@citrix.com
Chiradeep,
If we have a failback mechanism I mentioned earlier - it should not.
Regards
Ilya
-Original Message-
From: Chiradeep Vittal [mailto:chiradeep.vit...@citrix.com]
Sent: Tuesday, October 30, 2012 2:12 PM
To: CloudStack DeveloperList
Subject: Re: [REVIEW] MS LDAP Auth patch
just a bind to the AD should be enough.
If I was to compare CloudStack to another product that support local auth and
ldap auth - they usually have a failback method of authentication - just in
case LDAP is unreachable.
The logic was as follows:
1) attempt the login to CS with LDAP Credentia
was to compare CloudStack to another product that support local auth and
ldap auth - they usually have a failback method of authentication - just in
case LDAP is unreachable.
The logic was as follows:
1) attempt the login to CS with LDAP Credentials, if succeed, proceed - if
failed, goto option 2
helps a bit.
>
>Cheers,
>
>Hugo
>
>> -Original Message-
>> From: Abhinandan Prateek [mailto:abhinandan.prat...@citrix.com]
>> Sent: Tuesday, October 30, 2012 5:33 AM
>> To: cloudstack-dev@incubator.apache.org
>> Subject: Re: [REVIEW] MS LDAP Auth patch - UI C
or.apache.org
> Subject: Re: [REVIEW] MS LDAP Auth patch - UI CSS and Architecture help
> needed
>
> Ilya,
> Yes that is correct. We need to first disable the md5 encryption being done
> by javascript. There is a variable (md5Hashed/md5HashedLogin) setting in
> javascript tha
cause javascript overrides the password when
>user pressed submit.
>
>Regards
>ilya
>
>
>If we don't
>
>-Original Message-
>From: Abhinandan Prateek [mailto:abhinandan.prat...@citrix.com]
>Sent: Monday, October 29, 2012 1:02 AM
>To: cloudstack-dev@
ailto:abhinandan.prat...@citrix.com]
Sent: Monday, October 29, 2012 1:02 AM
To: cloudstack-dev@incubator.apache.org
Subject: Re: [REVIEW] MS LDAP Auth patch - UI CSS and Architecture help needed
The javascipt encodes the password. We need to disable the encoding even for
regular login. In compo
@incubator.apache.org
>Subject: [REVIEW] MS LDAP Auth patch - UI CSS and Architecture help needed
>
>Below is a proof of concept code to get the Microsoft Active Directory
>LDAP Authentication to work with CS3 and CS4. I've been using it in my
>environment - so its tested and wor
No takers :( ?
I guess most people don't run evil empire AD.
-Original Message-
From: Musayev, Ilya [mailto:imusa...@webmd.net]
Sent: Friday, October 26, 2012 3:46 PM
To: cloudstack-dev@incubator.apache.org
Subject: [REVIEW] MS LDAP Auth patch - UI CSS and Architecture help n
2012-10-25 13:50:49.244834323 -0400
+++ /usr/share/cloud/management/webapps/client/index.jsp 2012-10-26
15:04:17.836817297 -0400
@@ -58,6 +58,10 @@
+
+
29 matches
Mail list logo