Displaying 12 results from an estimated 12 matches for "authldapbinddn".
2015 May 11
6
Authenticating Apache Against Active Directory
...AuthName "AD authentication"
AuthBasicProvider ldap
AuthType Basic
AuthLDAPGroupAttribute member
AuthLDAPGroupAttributeIsDN On
AuthLDAPURL
ldap://dc1.domain.local/172.16.232.29:389/cn=Users,dc=domain?sAMAccountName?sub?(objectClass=*)
AuthLDAPBindDN cn=apache-connect,cn=Users,domain
AuthLDAPBindPassword password
require ldap-group cn=Nagios-Admins,cn=Users,domain
and attempt to restart Apache. I get the following.
root at nagios:~# service apache2 restart
* Restarting web server
apache2...
2008 Apr 10
2
mod_auth_ldap Apache2 on CentOS 5 and require group
Hi , i am facing a strange problem.
I have centos , i wan to access svn trought apache using mod auth ldap.
This is what i have configured
AuthLDAPBindDN cn=svn,ou=Operators,o=Organization
AuthLDAPBindPassword Pass1
AuthLDAPURL "ldap://ldap/ou=Users,o=Organization?uid"
AuthLDAPGroupAttribute member
AuthLDAPGroupAttributeIsDN on
Require group cn=tester2,ou=Groups,o=Organization
What is strange?
Acco...
2015 Oct 07
1
Working configuration for Apache 2.4 auth vs Samba 4 AD
...g/docs/2.4/en/mod/mod_authnz_ldap.html)
First you need authnz_ldap module for Apache.
<Location />
AuthName "AD authentication"
AuthBasicProvider ldap
AuthType Basic
AuthLDAPGroupAttribute member
AuthLDAPGroupAttributeIsDN On
AuthLDAPURL "ldap://addc1:3268/?sAMAccountName?sub
AuthLDAPBindDN apache-connect at contoso.com
AuthLDAPBindPassword password
Require ldap-group CN=Sysadmins_GRP,OU=groups,OU=company,DC=contoso,DC=com
</Location>
Hope this will help someone and could be a good idea to update the wiki
page.
2017 Apr 04
1
Apache2 Kerberos-Authentication and LDAP-Authorization
...ember
AuthLDAPGroupAttributeIsDn On
# Adding cn and displayName is optional, but provides the value
# as environment variables to the script
# e.g.: AUTHORIZE_DISPLAYNAME="John Doe"
AuthLDAPURL
ldaps://{ad-server}/CN=Users,DC=X,DC=Y?sAMAccountName,cn,displayName?sub?(objectClass=*)
AuthLDAPBindDN CN=http-{servername},CN=Users,DC=X,DC=Y
AuthLDAPBindPassword {password of user "http-{servername}"}
require ldap-group cn={groupname},cn=Users,DC=X,DC=Y
# Sends forbidden when Kerberos authentication succeeded,
# but LDAP authorization failed. This is the case when a
# user is not...
2015 May 11
0
Authenticating Apache Against Active Directory
...tion"
> AuthBasicProvider ldap
> AuthType Basic
> AuthLDAPGroupAttribute member
> AuthLDAPGroupAttributeIsDN On
> AuthLDAPURL
> ldap://dc1.domain.local/172.16.232.29:389/cn=Users,dc=domain?sAMAccountName?sub?(objectClass=*)
> AuthLDAPBindDN cn=apache-connect,cn=Users,domain
> AuthLDAPBindPassword password
> require ldap-group cn=Nagios-Admins,cn=Users,domain
>
>
> and attempt to restart Apache. I get the following.
>
> root at nagios:~# service apache2 restart
> * Restarting web server
>...
2015 May 12
0
Authenticating Apache Against Active Directory
...tion"
> AuthBasicProvider ldap
> AuthType Basic
> AuthLDAPGroupAttribute member
> AuthLDAPGroupAttributeIsDN On
> AuthLDAPURL
> ldap://dc1.domain.local/172.16.232.29:389/cn=Users,dc=domain?sAMAccountName?sub?(objectClass=*)
> AuthLDAPBindDN cn=apache-connect,cn=Users,domain
> AuthLDAPBindPassword password
> require ldap-group cn=Nagios-Admins,cn=Users,domain
Why are you bothering to use anything outside of Kerberos? Very few
web projects actually need any group, uid, or other information and
are much simplified...
2017 Nov 09
0
Best practice for creating an RO LDAP User in AD...
...AP access to do LDAP queries; this 'mta'
> examples, need to me to do email/aliases procesing in exim.
>
For what it's worth, I have done exactly this for an account I use in
Apache for LDAP authentication, it sounds similar to your use case here.
In my Apache config I have:
AuthLDAPBindDN cn=apacheuser,cn=Users,dc=mydomain,dc=uk
and I have just checked in AD, this user is a member of 'Domain Guests' and
not 'Domain Users'.
I think, if you are only doing LDAP searches and not using any "Windows
style" functionality, then this will work just fine.
Try it, a...
2011 Mar 09
1
Apache/Active Directory authentication
...ame/passwd.
<Directory /var/www/html/secure>
Allow from All
AuthType Basic
AuthName "Ldap test area"
AuthBasicProvider ldap
AuthzLDAPAuthoritative on
AuthLDAPURL "ldap://server:389/OU=OU=name,OU=area,DC=core,DC=test,DC=edu?sAMAccountName?sub?(objectClass=*)"
AuthLDAPBindDN "username at core"
AuthLDAPBindPassword password
require valid-user
</Directory>
- In addition, I used LikeWise software and was able to successfully join AD.
I was wondering if there is a way to do http authentication without passing my username/password considering server is...
2007 Oct 25
0
apache mod_authnzldap against Active Directory
.... (all the bind
responses reported success)
The appropriate (anonymized) lines from httpd.conf are:
<Location /logo.gif> # <--- change path as needed
Order allow,deny
Allow from all
AuthBasicProvider ldap
AuthType Basic
AuthzLdapAuthoritative off
AuthName "BackupPC login"
AuthLDAPBindDN ldapb at centos.org
AuthLDAPBindPassword myformerlysecretpasswordpostedtoworld
AuthLDAPURL "ldap://10.XX.XX.XXX:389/DC=centos,DC=org?sAMAccountName?sub?
(objectClass=*)" NONE
require valid-user
</Location>
I have debug turned on. On startup I get:
[root at backuppc httpd]# servi...
2016 Apr 12
1
Slow authentication on C7
...24
LDAPOpCacheTTL 600
<Location /ldap-status>
SSLRequire true
SetHandler ldap-status
</Location>
<Location /repos>
DAV svn
SVNParentPath /srv/svn/repos
</Location>
<Location /repos/repo1>
SSLRequireSSL
AuthName "SVN Repo 1"
AuthType Basic
AuthLDAPBindDN cn=svnbind,cn=systemusers,dc=example,dc=com
AuthLDAPBindPassword plaintextpassword
AuthUserFile /etc/httpd/svnpasswd
AuthLDAPURL "ldaps://ldapserver1.example.com/dc=example,dc=com?uid
ldaps://ldapserver2.example.com/dc=example,dc=com?uid "
AuthBasicProvider file ldap
AuthzLD...
2016 Apr 12
2
Slow authentication on C7
James Hogarth wrote:
> On 12 Apr 2016 16:29, "Scott Robbins" <scottro11 at gmail.com> wrote:
>> On Tue, Apr 12, 2016 at 09:45:17AM +0200, Marcin Trendota wrote:
>> > W dniu 11.04.2016 o 20:07, Scott Robbins pisze:
<SNIP>
> After various testing I ended up going with the Apache LDAP cache module
> and doing the auth at the Apache level, not system.
>
2017 Nov 08
5
Best practice for creating an RO LDAP User in AD...
Mandi! Rowland Penny via samba
In chel di` si favelave...
> Not sure what you are proposing is going to work, AD expects every user
> to be a member of Domain Users, even though there is nothing in AD to
> show membership.
Ah.
> Do you require this user to visible on all domain machines ?
[...]
> It might help if you could explain how you are going to use your new
> user