Last modified by Thomas Mortagne on 2023/09/04 09:29

From version 2.1
edited by Thomas Mortagne
on 2008/07/25 14:43
Change comment: There is no comment for this version
To version 4.1
edited by Thomas Mortagne
on 2008/08/01 14:49
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -1,5 +1,17 @@
1 -1 Use case of configuration to authenticate users with LDAP
1 +1 Use cases of configuration to authenticate users with LDAP
2 2  
3 3  Here you can find some detailed uses cases of LDAP authentication configuration.
4 4  
5 5  #toc("" "" "")
6 +
7 +1.1 My users are not located in the same organization unit
8 +
9 +So you can use the <tt>xwiki.authentication.ldap.bind_DN=cn={0},department=USER,department=INFORMATIK,department=1230,o=MP</tt> pattern.
10 +
11 +To handle that LDAP authentication automatically search for user DN trying to match the provided login with <tt>xwiki.authentication.ldap.UID_attr</tt> attribute value. So simply set an existing administration (or any other LDAP user with the right to search in the whole LDAP server) user DN at <tt>xwiki.authentication.ldap.bind_DN</tt> and its password at <tt>xwiki.authentication.ldap.bind_pass</tt>. LDAP authentication will user it to connect to LDAP server, search for provided user and bind found DN with provided password to validate it.
12 +
13 +For example if you have an an admin user with DN "cn=Administrator,dc=mydomain,dc=org" and password "pass" set:
14 +{code}
15 +xwiki.authentication.ldap.bind_DN=cn=Administrator,dc=mydomain,dc=org
16 +xwiki.authentication.ldap.bind_pass=pass
17 +{code}

Get Connected