Web authentication with ldap and active directory

I have been asked to set up web access with LDAP authentication against Active Directory. I just cant get it going in our test environment

Directory Assistance DB setup

Domain Type-> LDAP

Trusted for Credentials-> NO

Hostname: testserver.test.zone

Optional Authentication Credential:

Username: cn=administrator,cn=users,dc=test,dc=zone

Base DN for search:

Channel encryption: None

Port: 389

Type of search filter to use: Active Directory

Administrator is a user in the Active Directory…

When I log kick off my browser I cant log in with cn=administrator,cn=users,dc=test,dc=zone or just administrator…

I can see and connect to the active directory with the softera LDAP browser so I know it is something in my domino setup…

Can anyone advise?

Subject: Sure the second line of your config: Trusted for Credentials-> NO

Well if it is not trusted for credentials, you can NOT log in.

Subject: web authentication with ldap and active directory

I have been asked to set up web access with LDAP authentication against Active Directory. I just cant get it going in our test environment

Directory Assistance DB setup

Domain Type-> LDAP

Trusted for Credentials-> NO

Hostname: testserver.test.zone

Optional Authentication Credential:

Username: cn=administrator,cn=users,dc=test,dc=zone

Base DN for search:

Channel encryption: None

Port: 389

Type of search filter to use: Active Directory

Administrator is a user in the Active Directory…

When I log kick off my browser I cant log in with cn=administrator,cn=users,dc=test,dc=zone or just administrator…

I can see and connect to the active directory with the softera LDAP browser so I know it is something in my domino setup…

Bill’s spotted a login problem .

After that, your searches are going to fail because the AD LDAP server insists on a “Base DN for search”. Given your credentials, I’m guessing you want “cn=users,dc=test,dc=zone” as the base dn.

Subject: RE: web authentication with ldap and active directory

Thanks for the tips…

only other thing I had to do was add cn=administrator/cn=users/dc=test/dc=zone in the acl…

thanks again