search for: usernameattributes

Displaying 4 results from an estimated 4 matches for "usernameattributes".

Did you mean: username_attribute
2020 Aug 21
4
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...roupMembershipAttributes: [ "memberof:1.2.840.113556.1.4.1941:" ] > ??? usersQuery: > ??????? baseDN: "DC=ad,DC=lasthome,DC=solace,DC=krynn" > ??????? scope: sub > ??????? derefAliases: never > ??????? filter: (objectclass=person) > ??????? pageSize: 0 > ??? userNameAttributes: [ "sAMAccountName" ] As far as I can see (and I could be missing something obvious), whilst it defines the search base, etc, it doesn't define what DN to search for. Should [ "memberof:1.2.840.113556.1.4.1941:" ]? be something like: [ "memberof:1.2.840.113556.1.4.1...
2020 Aug 21
2
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
On 21/08/2020 20:08, Rowland penny via samba wrote: > On 21/08/2020 19:28, Vincent S. Cojot via samba wrote: >> >> Hi everyone, >> >> I have a working Samba AD/DC (4.12.6 on RHEL7.8) setup I'm trying to >> use with OpenShift (a container platform to which RedHat contributes >> - aka OCP). I'm also not too skilled on LDAP even though I've been
2020 Aug 21
0
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
..."memberof:1.2.840.113556.1.4.1941:" ] >> ??? usersQuery: >> ??????? baseDN: "DC=ad,DC=lasthome,DC=solace,DC=krynn" >> ??????? scope: sub >> ??????? derefAliases: never >> ??????? filter: (objectclass=person) >> ??????? pageSize: 0 >> ??? userNameAttributes: [ "sAMAccountName" ] > > As far as I can see (and I could be missing something obvious), whilst > it defines the search base, etc, it doesn't define what DN to search > for. Should [ "memberof:1.2.840.113556.1.4.1941:" ]? be something like: > > [ "m...
2020 Aug 21
3
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...es: [ "memberof:1.2.840.113556.1.4.1941:" ] #groupMembershipAttributes: [ "memberof" ] usersQuery: baseDN: "DC=ad,DC=lasthome,DC=solace,DC=krynn" scope: sub derefAliases: never filter: (objectclass=person) pageSize: 0 userNameAttributes: [ "sAMAccountName" ] #tolerateMemberNotFoundErrors: true #tolerateMemberOutOfScopeErrors: false -------------- next part -------------- apiVersion: config.openshift.io/v1 kind: OAuth metadata: name: cluster spec: identityProviders: - name: KRYNN_AD mappingMethod: claim...