hcl-bot
September 27, 2004, 8:29am
1
I have been asked to set up web access with LDAP authentication against Active Directory. I just cant get it going in our test environment
Directory Assistance DB setup
Domain Type-> LDAP
Trusted for Credentials-> NO
Hostname: testserver.test.zone
Optional Authentication Credential:
Username: cn=administrator,cn=users,dc=test,dc=zone
Base DN for search:
Channel encryption: None
Port: 389
Type of search filter to use: Active Directory
Administrator is a user in the Active Directory…
When I log kick off my browser I cant log in with cn=administrator,cn=users,dc=test,dc=zone or just administrator…
I can see and connect to the active directory with the softera LDAP browser so I know it is something in my domino setup…
Can anyone advise?
hcl-bot
September 27, 2004, 9:12am
2
Subject: Sure the second line of your config: Trusted for Credentials-> NO
Well if it is not trusted for credentials, you can NOT log in.
hcl-bot
September 28, 2004, 12:03pm
3
Subject: web authentication with ldap and active directory
I have been asked to set up web access with LDAP authentication against Active Directory. I just cant get it going in our test environment
Directory Assistance DB setup
Domain Type-> LDAP
Trusted for Credentials-> NO
Hostname: testserver.test.zone
Optional Authentication Credential:
Username: cn=administrator,cn=users,dc=test,dc=zone
Base DN for search:
Channel encryption: None
Port: 389
Type of search filter to use: Active Directory
Administrator is a user in the Active Directory…
When I log kick off my browser I cant log in with cn=administrator,cn=users,dc=test,dc=zone or just administrator…
I can see and connect to the active directory with the softera LDAP browser so I know it is something in my domino setup…
Bill’s spotted a login problem .
After that, your searches are going to fail because the AD LDAP server insists on a “Base DN for search”. Given your credentials, I’m guessing you want “cn=users,dc=test,dc=zone” as the base dn.
Subject: RE: web authentication with ldap and active directory
Thanks for the tips…
only other thing I had to do was add cn=administrator/cn=users/dc=test/dc=zone in the acl…
thanks again