Thx for this. Just open a JIRA and upload any documentation or source code you can. I am happy to review and commit them.

On 23/09/13 20:56, Robert Munn wrote:
Absolutely yes, I am happy to contribute. I am in the process of
implementing the <restriction > directive for groups and will share that
when it is working.

I have other configuration experiences/details I would like to contribute
to documentation as well. I have done a lot of testing with SSL settings
with various email clients and will share what I have learned.

I don't see anything in the LDAP source code related to LDAP over SSL. I
was wondering if anyone had implemented it. I looked at the source code and
it seems like code-wise you would have to add

SECURITY_PROTOCOL "ssl"

  to the configuration. I am guessing there could be issues related to the
LDAP server certificate as well, given that the other SSL-related docs
specify having only one cert in the keystore in order for SSL to work
properly.  My cert has entries for the LDAP server and the mail server, so
I am thinking I might be able to get it to work, but that isn't a good
generalized solution. Any suggestions in that direction would be great.




On Sun, Sep 22, 2013 at 9:34 PM, Eric Charles <[email protected]> wrote:

Thx for sharing this. If OK for you, I will take you config in the James
documentation.


On 23/09/13 00:20, Robert Munn wrote:

This message is a reply to an earlier message about LDAP authentication
failure. I have this working and thought I would share my config.

This is on Windows, FYI. I implemented a base Active Directory LDAP
instance with Users.LDIF. It creates a configuration from the root node
(cn=<host>,dc=<domain>,dc=com) that looks like this:

CN=LostAndFound
CN=NTDS Quotas
CN=Roles
CN=Users

I added a user  (called admin below) at this level of the tree, which
looks
like this:

CN=LostAndFound
CN=NTDS Quotas
CN=Roles
CN=admin

I then added this user to the administrator Role in the tree:

1. select CN=Roles, then CN=Administrators
2, right-click CN=Administrators and selecting Properties
3. click members from the list of properties
4. click the Add DN button and add the DN of the admin
(cn=admin,cn=<host>,dc=<**domain>,dc=com)
5. Lastly, in the user's properties, set msDS-UserAccountDisabled = False.

<repository name="LocalUsers"
class="org.apache.james.user.**ldap.**ReadOnlyUsersLDAPRepository"
ldapHost="ldap://localhost:**389";
principal="cn=admin,cn=<host>,**dc=<domain>,dc=com"
credentials="<password>"
userBase="cn=Users,cn=<host>,**dc=<domain>,dc=com" userObjectClass="user"
userIdAttribute="cn"/>

Note the userIdAttribute, which is set to cn for the implementation above.

Also note the userBase starts with CN=Users. I add all the regular users
at
that level (one level below the admin).

In order to get this working, I worked out connecting to the LDAP store
using the ldp.exe directory browser on Windows.


------------------------------**------------------------------**---------
To unsubscribe, e-mail: 
server-user-unsubscribe@james.**apache.org<[email protected]>
For additional commands, e-mail: 
[email protected].**org<[email protected]>




---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to