-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support building a user DN from a template #37
Comments
The nslcd daemon will use a simple BIND request by default for user authentication when the PAM module is used. The debug log should contain something like:
While it uses the ldap_sasl_bind() function, the BIND operation to the server should be a simple bind with just a DN and a password. Please provide more details. |
Hi, Thanks for your reply. Below is my configuration file.
Below is the log
If I add the Maybe I am mistaken with the configuration. |
The These name lookups are not tied to any particular system user because they are carried out before authentication. The first search that is done in the authc request is also a name lookup to translate the username into a user DN that can be used in the subsequent BIND operation. |
While in theory this could be implemented, I don't think this will work for normal system account authentication because almost every PAM stack will lookup the user (the One scenario where this perhaps could work is when the LDAP users already exist in |
Hi,
I am trying to use the simple bind method for authentication of users.
To illustrate my need, please have a look to https://help.fortinet.com/fadc/4-8-0/olh/Content/FortiADC/handbook/remote_ldap_server.htm.
I can not figure out how to do it and from my understanding of the code and the debug log I get from my trials, I think this is not supported.
Is it possible to add the support ?
Thanks for your future answers.
The text was updated successfully, but these errors were encountered: