Ok, this is clearer.

Such a request will never work with a plain LDAP server. The Name must be a DN, aka something like cn=John Doe, ou=apache, dc=org

Here it's myorg\ldaptest1, which is not supported.

I haven't touched a Windows machine for decades, so I won't be very useful, but my take on this is that you most certainly need to use a SASL bind to deal with such credentials.

On 07/11/2023 16:16, Shirley Tarboton wrote:


MessageType : BIND_REQUEST

Message ID : 1

     BindRequest

         Version : '3'

         Name : 'myorg\ldaptest1'

         Simple authentication : '(omitted-for-safety)'


Note:
Logs before bind request:


4297 [main] INFO org.apache.directory.api.ldap.schema.manager.impl.DefaultSchemaManager - MSG_16015_LOADING_ENABLED_SCHEMA (microsoft,    Schema Name: microsoft

                                 Disabled: false

                                Owner: 0.9.2342.19200300.100.1.1= admin ,2.5.4.11= system

                                 Dependencies: []

                                 SchemaLoader : )

5256 [main] INFO  org.apache.directory.server.ldap.LdapServer  - Successful bind of an LDAP Service (10348) is completed.

5256 [main] INFO  org.apache.directory.server.ldap.LdapServer  - Ldap service started



On 7 Nov 2023, at 13:50, Emmanuel Lécharny <[email protected]> wrote:



On 07/11/2023 14:00, Shirley Tarboton wrote:
Hi,
Is this snippet sufficient ?
5425 [pool-4-thread-1] INFO  org.apache.directory.server.ldap.handlers.request.BindRequestHandler  - The myorg\ldaptest1 principalDN cannot be found in the server : bind failure.

It's looking for an entry which DN is not a DN: myorg\ldaptest1

Can you also post the bind request you send?

5426 [pool-4-thread-1] INFO  org.apache.directory.server.core.api.interceptor.context.BindOperationContext  - Bad authentication for null
Many thanks

On 7 Nov 2023, at 12:39, Emmanuel Lécharny <[email protected]> wrote:

Hi,

On 07/11/2023 12:44, Shirley Tarboton wrote:
Hi All, first time posting on here …
We have a set of services that we deploy to different environments, some of which use OpenLDAP, but others use Active Directory. We’ve modified our code to allow for different configuration and to integrate with ActiveDirectory, and are now updating the unit tests to test both scenarios based on additional configuration. We’ve attempted to update the users.ldif for the ActiveDirectory unit test to include sAMAccountName by making Microsoft-compatible Schema changes. After a lot of tweaks, the users.ldif changes seem to be accepted, but the BindRequestHandler cannot find the principalDN.


Can you attach the logs you get?


 Just wanted to check whether anyone has tried this before? Are we wasting our time?  Shall we switch to mock testing instead?
Many thanks for your help

--
*Emmanuel Lécharny* P. +33 (0)6 08 33 32 61
[email protected]

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]


--
*Emmanuel Lécharny* P. +33 (0)6 08 33 32 61
[email protected]

--
*Emmanuel Lécharny* P. +33 (0)6 08 33 32 61
[email protected]

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to