Last modified by Thomas Mortagne on 2023/09/04 09:29

<
From version < 3.1 >
edited by Thomas Mortagne
on 2008/07/25 17:30
To version < 4.1 >
edited by Thomas Mortagne
on 2008/08/01 14:49
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -3,3 +3,15 @@
3 3  Here you can find some detailed uses cases of LDAP authentication configuration.
4 4  
5 5  #toc("" "" "")
6 +
7 +1.1 My users are not located in the same organization unit
8 +
9 +So you can use the <tt>xwiki.authentication.ldap.bind_DN=cn={0},department=USER,department=INFORMATIK,department=1230,o=MP</tt> pattern.
10 +
11 +To handle that LDAP authentication automatically search for user DN trying to match the provided login with <tt>xwiki.authentication.ldap.UID_attr</tt> attribute value. So simply set an existing administration (or any other LDAP user with the right to search in the whole LDAP server) user DN at <tt>xwiki.authentication.ldap.bind_DN</tt> and its password at <tt>xwiki.authentication.ldap.bind_pass</tt>. LDAP authentication will user it to connect to LDAP server, search for provided user and bind found DN with provided password to validate it.
12 +
13 +For example if you have an an admin user with DN "cn=Administrator,dc=mydomain,dc=org" and password "pass" set:
14 +{code}
15 +xwiki.authentication.ldap.bind_DN=cn=Administrator,dc=mydomain,dc=org
16 +xwiki.authentication.ldap.bind_pass=pass
17 +{code}

Get Connected