Bug 2218132
Summary: | Satellite LDAP Authentication with AD does not allow bind password over 60 characters | ||
---|---|---|---|
Product: | Red Hat Satellite | Reporter: | Lukáš Hellebrandt <lhellebr> |
Component: | LDAP | Assignee: | satellite6-bugs <satellite6-bugs> |
Status: | CLOSED DEFERRED | QA Contact: | Satellite QE Team <sat-qe-bz-list> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.14.0 | CC: | aruzicka, rlavi |
Target Milestone: | Unspecified | Keywords: | Triaged |
Target Release: | Unused | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2023-10-05 12:25:20 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Lukáš Hellebrandt
2023-06-28 09:33:35 UTC
This is a valid bug. However, the fix would need to land in a third party library (net-ldap), where we don't have any permissions and where we don't know the codebase at all so it would be somewhat larger time investment. There are also no customer cases attached - the only customer I'm aware of that complained about this issue was satisfied with 64 characters. With that being said, I'll go ahead and close this one since we do not believe it will be fixed in the next multiple releases due to the priority of this bug as compared to others. If this is a large impact on you, please feel free to re-open it and provide additional information to help us better prioritize it. |