Changes for page Use cases of configuration to authenticate users with LDAP
Last modified by Thomas Mortagne on 2019/07/22 14:23
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -xwiki:XWiki.ste el1 +xwiki:XWiki.ThomasMortagne - Content
-
... ... @@ -6,7 +6,7 @@ 6 6 7 7 1.1 My users are not located in the same organization unit 8 8 9 -So you can use the <tt>xwiki.authentication.ldap.bind_DN=cn={0},department=USER,department=INFORMATIK,department=1230,o=MP</tt> pattern. 9 +So you can't use the <tt>xwiki.authentication.ldap.bind_DN=cn={0},department=USER,department=INFORMATIK,department=1230,o=MP</tt> pattern. 10 10 11 11 To handle that LDAP authentication automatically search for user DN trying to match the provided login with <tt>xwiki.authentication.ldap.UID_attr</tt> attribute value. So simply set an existing administration (or any other LDAP user with the right to search in the whole LDAP server) user DN at <tt>xwiki.authentication.ldap.bind_DN</tt> and its password at <tt>xwiki.authentication.ldap.bind_pass</tt>. LDAP authentication will user it to connect to LDAP server, search for provided user and bind found DN with provided password to validate it. 12 12 ... ... @@ -16,6 +16,7 @@ 16 16 xwiki.authentication.ldap.bind_pass=pass 17 17 {code} 18 18 19 + 19 19 1.1 My users are not located on the same server 20 20 21 21 e.g. if you use several subdomains and the users are defined seperately in each subdomain. This will likely be the case when you have a configuration like this: