[Catalyst] LDAP question

Kenneth S Mclane ksmclane at us.ibm.com
Mon May 21 20:34:48 GMT 2012


ok, making progress, I am getting all the data back in the return hash, =

however, I get the error: "Unable to locate user matching user info =

provided in realm: ldap" and get redirected back to the login page. I =

built this using some examples from the tutorial and the definitive guide, =

so I may have a wire crossed somewhere. Any ideas?

Luis Mu=F1oz <luisemunoz at gmail.com> wrote on 05/21/2012 11:18:48 AM:

> From:
> =

> Luis Mu=F1oz <luisemunoz at gmail.com>
> =

> To:
> =

> The elegant MVC web framework <catalyst at lists.scsys.co.uk>
> =

> Date:
> =

> 05/21/2012 11:20 AM
> =

> Subject:
> =

> Re: [Catalyst] LDAP question
> =

> =

> On May 21, 2012, at 12:02 PM, Kenneth S Mclane wrote:
> =

> > I have no control over the LDAP server, How would I change things =

> so the submitted username and password would be inserted as the =

> credentials to be used as the initial bind? =

> =

> You use that from the client.
> =

> Below is a snippet from a configuration file from a tool we use at =

> $work for managing LDAP entries. It works in the way I described before.
> =

> Pay attention to the binddn (the account to do the initial bind) and
> basedn (the place where you begin your search for a matching =

> username, using the filter expression). Start simple and build up =

> your expression to narrow down the tuples that it can retrieve. I'm =

> pro very strict filters based on object types, but there are perhaps
> other opinions.
> =

> Best regards
> =

> -lem
> =

> --8<----
> =

> # Configure the authentication subsystem. This is the component that
> # validates the current password for change requests. This service is
> # provided by Catalyst::Authentication::Store::LDAP.
> # =

> # The ldap realm is mandatory, as this is used not only for
> # authentication but for access to the user's LDAP entry, both for
> # searching and for updating it. This means that we need to use a
> # binddn with enough privileges to read and write to the
> # directory. It's not enough to rely on the users' credentials for
> # rebinding, because in the case of a password recovery, we don't have
> # user credentials.
> =

> authentication:
>   default_realm: ldap
>   realms:
>     ldap:
>       credential:
>         class:          Password
>         password_field: password
>         password_type:  self_check
>       store:
>         class:          LDAP
>         ldap_server:    localhost:3389
>         binddn:         cn=3Dyour_initial_id,dc=3Ddomain,dc=3Dcom,dc=3DIN=
VALID
>         bindpw:         Y0urS3cr3tB!ndP@$sw0rd
>         user_basedn: =

> ou=3DThe,ou=3DContainer,ou=3DHierarchy,dc=3Ddomain,dc=3Dcom,dc=3DINVALID
>         user_filter: (&(objectClass=3DinetOrgPerson)(|(uid=3D%s)(email=3D=
%s)))
>         user_field:     uid
>         use_roles:      0
> =

> =

> _______________________________________________
> List: Catalyst at lists.scsys.co.uk
> Listinfo: http://lists.scsys.co.uk/cgi-bin/mailman/listinfo/catalyst
> Searchable archive: =

http://www.mail-archive.com/catalyst@lists.scsys.co.uk/
> Dev site: http://dev.catalyst.perl.org/
> =

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.scsys.co.uk/pipermail/catalyst/attachments/20120521/404ea=
e53/attachment.htm


More information about the Catalyst mailing list