Displaying 4 results from an estimated 4 matches for "usernameattributes".
Did you mean:
username_attribute
2020 Aug 21
4
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...roupMembershipAttributes: [ "memberof:1.2.840.113556.1.4.1941:" ]
> ??? usersQuery:
> ??????? baseDN: "DC=ad,DC=lasthome,DC=solace,DC=krynn"
> ??????? scope: sub
> ??????? derefAliases: never
> ??????? filter: (objectclass=person)
> ??????? pageSize: 0
> ??? userNameAttributes: [ "sAMAccountName" ]
As far as I can see (and I could be missing something obvious), whilst
it defines the search base, etc, it doesn't define what DN to search
for. Should [ "memberof:1.2.840.113556.1.4.1941:" ]? be something like:
[ "memberof:1.2.840.113556.1.4.1...
2020 Aug 21
2
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
On 21/08/2020 20:08, Rowland penny via samba wrote:
> On 21/08/2020 19:28, Vincent S. Cojot via samba wrote:
>>
>> Hi everyone,
>>
>> I have a working Samba AD/DC (4.12.6 on RHEL7.8) setup I'm trying to
>> use with OpenShift (a container platform to which RedHat contributes
>> - aka OCP). I'm also not too skilled on LDAP even though I've been
2020 Aug 21
0
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
..."memberof:1.2.840.113556.1.4.1941:" ]
>> ??? usersQuery:
>> ??????? baseDN: "DC=ad,DC=lasthome,DC=solace,DC=krynn"
>> ??????? scope: sub
>> ??????? derefAliases: never
>> ??????? filter: (objectclass=person)
>> ??????? pageSize: 0
>> ??? userNameAttributes: [ "sAMAccountName" ]
>
> As far as I can see (and I could be missing something obvious), whilst
> it defines the search base, etc, it doesn't define what DN to search
> for. Should [ "memberof:1.2.840.113556.1.4.1941:" ]? be something like:
>
> [ "m...
2020 Aug 21
3
Using Samba AD/DC as an Active Directory OAuth provider for OpenShift
...es: [ "memberof:1.2.840.113556.1.4.1941:" ]
#groupMembershipAttributes: [ "memberof" ]
usersQuery:
baseDN: "DC=ad,DC=lasthome,DC=solace,DC=krynn"
scope: sub
derefAliases: never
filter: (objectclass=person)
pageSize: 0
userNameAttributes: [ "sAMAccountName" ]
#tolerateMemberNotFoundErrors: true
#tolerateMemberOutOfScopeErrors: false
-------------- next part --------------
apiVersion: config.openshift.io/v1
kind: OAuth
metadata:
name: cluster
spec:
identityProviders:
- name: KRYNN_AD
mappingMethod: claim...