Changes for page Use cases of configuration to authenticate users with LDAP
Last modified by Thomas Mortagne on 2019/07/22 14:23
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -xwiki:XWiki. ThomasMortagne1 +xwiki:XWiki.steel - Content
-
... ... @@ -15,3 +15,21 @@ 15 15 xwiki.authentication.ldap.bind_DN=cn=Administrator,dc=mydomain,dc=org 16 16 xwiki.authentication.ldap.bind_pass=pass 17 17 {code} 18 + 19 +1.1 My users are not located on the same server 20 + 21 +e.g. if you use several subdomains and the users are defined seperately in each subdomain. This will likely be the case when you have a configuration like this: 22 + 23 +{code} 24 +sub1.somedomain.com 25 +sub2.somedomain.com 26 +sub3.somedomain.com 27 +... 28 +{code} 29 + 30 +XWiki cannot search in multiple domains (as of XWiki 1.5). 31 + 32 +1.1.1 Approach 1: Configure group membership login 33 +One possible solution is to make one (or more) group(s) in your AD and set the group membership to all users that have to have access to your wiki. Then configure XWiki's to only let members of that group log in. If a user wants to log in, XWiki will look up if the user's credentials are found in the group member attributes in AD. With this setting, XWiki will ignore the base_DN search, if a user was found in that group. 34 +Take care that the group membership attribute in AD (in its default configuration) will contain the CN ("FirstName LastName") - not the sAMAccountName. So your users will have to login with their full name instead of their username. 35 +