Changes for page Use cases of configuration to authenticate users with LDAP
Last modified by Thomas Mortagne on 2019/07/22 14:23
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -3,3 +3,15 @@ 3 3 Here you can find some detailed uses cases of LDAP authentication configuration. 4 4 5 5 #toc("" "" "") 6 + 7 +1.1 My users are not located in the same organization unit 8 + 9 +So you can use the <tt>xwiki.authentication.ldap.bind_DN=cn={0},department=USER,department=INFORMATIK,department=1230,o=MP</tt> pattern. 10 + 11 +To handle that LDAP authentication automatically search for user DN trying to match the provided login with <tt>xwiki.authentication.ldap.UID_attr</tt> attribute value. So simply set an existing administration (or any other LDAP user with the right to search in the whole LDAP server) user DN at <tt>xwiki.authentication.ldap.bind_DN</tt> and its password at <tt>xwiki.authentication.ldap.bind_pass</tt>. LDAP authentication will user it to connect to LDAP server, search for provided user and bind found DN with provided password to validate it. 12 + 13 +For example if you have an an admin user with DN "cn=Administrator,dc=mydomain,dc=org" and password "pass" set: 14 +{code} 15 +xwiki.authentication.ldap.bind_DN=cn=Administrator,dc=mydomain,dc=org 16 +xwiki.authentication.ldap.bind_pass=pass 17 +{code}