Skip to content

Commit 6832f19

Browse files
authored
Merge pull request #1149 from fzs/fixLDAPbinding
Fix LDAP binding strategies
2 parents 35f1491 + f004a7f commit 6832f19

File tree

3 files changed

+623
-144
lines changed

3 files changed

+623
-144
lines changed

src/main/distrib/data/defaults.properties

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1812,6 +1812,10 @@ realm.salesforce.orgId = 0
18121812
realm.ldap.server = ldap://localhost
18131813

18141814
# Login username for LDAP searches.
1815+
# This is usually a user with permissions to search LDAP users and groups.
1816+
# It must have at least have the permission to search users. If it does not
1817+
# have permission to search groups, the normal user logging in must have
1818+
# the permission in LDAP to search groups.
18151819
# If this value is unspecified, anonymous LDAP login will be used.
18161820
#
18171821
# e.g. mydomain\\username
@@ -1824,8 +1828,14 @@ realm.ldap.username = cn=Directory Manager
18241828
# SINCE 1.0.0
18251829
realm.ldap.password = password
18261830

1827-
# Bind pattern for Authentication.
1828-
# Allow to directly authenticate an user without LDAP Searches.
1831+
# Bind pattern for user authentication.
1832+
# Allow to directly authenticate an user without searching for it in LDAP.
1833+
# Use this if the LDAP server does not allow anonymous access and you don't
1834+
# want to use a specific account to run searches. When set, it will override
1835+
# the settings realm.ldap.username and realm.ldap.password.
1836+
# This requires that all relevant user entries are children to the same DN,
1837+
# and that logging users have permission to search for their groups in LDAP.
1838+
# This will disable synchronization as a specific LDAP account is needed for that.
18291839
#
18301840
# e.g. CN=${username},OU=Users,OU=UserControl,OU=MyOrganization,DC=MyDomain
18311841
#
@@ -1941,6 +1951,9 @@ realm.ldap.email = email
19411951
realm.ldap.uid = uid
19421952

19431953
# Defines whether to synchronize all LDAP users and teams into the user service
1954+
# This requires either anonymous LDAP access or that a specific account is set
1955+
# in realm.ldap.username and realm.ldap.password, that has permission to read
1956+
# users and groups in LDAP.
19441957
#
19451958
# Valid values: true, false
19461959
# If left blank, false is assumed

0 commit comments

Comments
 (0)