Bug 149905
Summary: | When using "subtree" for UserScope option, module only searches one subtree depth from base OU | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Darryl Carden <darryl_carden> |
Component: | mod_authz_ldap | Assignee: | Joe Orton <jorton> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-03-03 17:34:17 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Darryl Carden
2005-02-28 18:26:21 UTC
Afterthought. May or may not be important, but the LDAP being bound to in my case is Microsoft AD. Subtree scope should certainly be searching the whole subtree, yes; otherwise it's exactly equivalent to onelevel. Can you post the entire config fragment? Subtree search seems to be working as expected here against an OpenLDAP server. What gets logged to the error log when auth is denied? Can you try reproducing this using the "ldapsearch" command-line tool, to verify that OpenLDAP is working correctly; e.g. $ ldapsearch -x -h the.ad.box.com -b base-DN uid=joebloggs Further research: it appears this may be be related to use of referrals in AD. Further information would be useful: - is the AD on Win2K or Win2003? - given a working or not-working ldapsearch command as above; does also passing the -C option make a difference? Looks like this one was my mistake. Was using your suggestions, and having trouble getting a bind to the ldap via the command line ldapsearch. When looking at the error log for Apache, was seeing mostly just "basic LDAP authentication of user 'username' failed. Not much usefull there. Then remembered that for other applications, we had used a different port than the default 389 to bind to AD. In a nutshell, it looks like AD doesn't like to be bound to on port 389 at the root of the domain. Changed the bind port in the authz_ldap.conf to 3268, and now all is working well. For reference, it is 2003 Active Directory, and this is the conf being used: ______________________________________________________________ LoadModule authz_ldap_module modules/mod_authz_ldap.so <IfModule mod_authz_ldap.c> <Location /portal> AuthzLDAPEngine on AuthzLDAPSetAuthorization off AuthzLDAPServer server.corp.mxtr.net:3268 AuthzLDAPUserBase dc=corp,dc=mxtr,dc=net AuthzLDAPUserKey sAMAccountName AuthzLDAPUserScope subtree AuthzLDAPBindDN username.net AuthzLDAPBindPassword password AuthType basic AuthName "Authorized Access Test" require valid-user </Location> </IfModule> _________________________________________________________ Issue resolved by changing bind port. Sorry for jumping the gun and jumping to the wrong conclusion on this issue. Please accept my apologizes for wasting your time. :) No problem, glad to hear you got it working. |