Does the option 3 work changing the username from the form domain\username into [EMAIL PROTECTED] (domain in fqd form i.e. example.com)? Regards Michele
On Thu, Dec 11, 2008 at 9:12 AM, Craig McQueen <[EMAIL PROTECTED]>wrote: > My company (in Australia) has a working Apache server on its Intranet -- > incidentally, for serving Subversion. It's on Windows 2003 and it's set up > for authentication using the SSPI module. Currently Apache 2.0 but I want to > upgrade to 2.2 to support the latest Subversion. We are also using a > Subversion authorisation file that checks the username (provided by the > authentication mechanism) against path access controls. The usernames are > currently in the form LOCALDOMAIN\localuser. > > It's a global company and we now want to allow remote branches to access > the server. That means we want to extend authentication somehow. I'm looking > at the options but coming across obstacles for every one. Here's what I've > found. Note, I'm only really interested in options that will work for Apache > 2.2, since version 2.2 is needed for any upgrade of Subversion. I'm testing > on a Windows XP PC running Apache 2.2.10. > > Option 1: Create local-domain usernames for remote people > Not ideal due to security policy concerns. > > Option 2: SSPI plus password file > "Just doesn't work". Apache 2.2 changed the way authentication works. The > SSPI module still works by itself in 2.2, but it doesn't cooperate with > other authentication methods (as far as I can tell). Even though this > reference says how it can be done: > > http://tortoisesvn.net/docs/nightly/TortoiseSVN_en/help-onepage.html#tsvn-serversetup-apache-6 > When I configure it as said, the SSPI authentication continues to function > but the password authentication never succeeds. > > Option 3: LDAP plus password file > It works. However, the LDAP module doesn't have a concept of "domains" so > the usernames passed on to the Subversion file-based authorisation are in > plain form, without any "LOCALDOMAIN\" prepended. This means that the > authorisation file would need all "LOCALDOMAIN\" removed. Note that the > password file can have usernames in the form e.g. REMOTEDOMAIN\remoteuser, > so it is possible to avoid duplicates between the two systems. > > Option 4: LDAP lookup of LOCALDOMAIN plus LDAP lookup of REMOTEDOMAIN (plus > LDAP lookup of REMOTEDOMAIN2 etc) > It looks as though it should be possible. However, I can't get the LDAP > lookup of REMOTEDOMAIN to work (even by itself). It appears to be related to > the fact that the REMOTEDOMAIN LDAP directory has Japanese characters in the > "Base DN". I'm pretty sure the httpd.conf file has the Japanese characters > specified in proper RFC 2255 format. So I think there is a problem in the > LDAP authentication module in properly sending the queries with UTF-8 > content in the base DN. The error.log file says "[ldap_search_ext_s() for > user failed][No Such Object]" which seems to indicate that the LDAP server > isn't getting a valid base DN. Note that as in option 3, there is no concept > of "domains". The authorisation file would not be able to systematically > distinguish between users from LOCALDOMAIN and users from REMOTEDOMAIN. If > we had identical usernames in the two domains, we wouldn't be able to > separate them for authorisation. > > So, we're currently stuck on all our options, for a variety of reasons. Any > thoughts on this? > > Regards, > Craig McQueen > >