On 11/10/11, Norveris Noa Labañino <norveri...@ipigto.gu.rimed.cu> wrote:
> Saludos amigos, alguno de ustedes ha implentados bases de datos en
> postgresql o mysql pero que coja los usuarios de ldap?
>

No, pero en la documentación lo explica (sustituye aquí el número de
tu versión del postgresql):

http://www.postgresql.org/docs/9.1/static/auth-methods.html

Aquí un extracto:

19.3. Authentication Methods

The following subsections describe the authentication methods in more detail.

...

19.3.8. LDAP Authentication

This authentication method operates similarly to password except that
it uses LDAP as the password verification method. LDAP is used only to
validate the user name/password pairs. Therefore the user must already
exist in the database before LDAP can be used for authentication.

LDAP authentication can operate in two modes. In the first mode, the
server will bind to the distinguished name constructed as prefix
username suffix. Typically, the prefix parameter is used to specify
cn=, or DOMAIN\ in an Active Directory environment. suffix is used to
specify the remaining part of the DN in a non-Active Directory
environment.

In the second mode, the server first binds to the LDAP directory with
a fixed user name and password, specified with ldapbinduser and
ldapbinddn, and performs a search for the user trying to log in to the
database. If no user and password is configured, an anonymous bind
will be attempted to the directory. The search will be performed over
the subtree at ldapbasedn, and will try to do an exact match of the
attribute specified in ldapsearchattribute. If no attribute is
specified, the uid attribute will be used. Once the user has been
found in this search, the server disconnects and re-binds to the
directory as this user, using the password specified by the client, to
verify that the login is correct. This method allows for significantly
more flexibility in where the user objects are located in the
directory, but will cause two separate connections to the LDAP server
to be made.

The following configuration options are supported for LDAP:

ldapserver

    Name or IP of LDAP server to connect to.
ldapport

    Port number on LDAP server to connect to. If no port is specified,
the LDAP library's default port setting will be used.
ldaptls

    Set to 1 to make the connection between PostgreSQL and the LDAP
server use TLS encryption. Note that this only encrypts the traffic to
the LDAP server — the connection to the client will still be
unencrypted unless SSL is used.
ldapprefix

    String to prepend to the user name when forming the DN to bind as,
when doing simple bind authentication.
ldapsuffix

    String to append to the user name when forming the DN to bind as,
when doing simple bind authentication.
ldapbasedn

    Root DN to begin the search for the user in, when doing
search+bind authentication.
ldapbinddn

    DN of user to bind to the directory with to perform the search
when doing search+bind authentication.
ldapbindpasswd

    Password for user to bind to the directory with to perform the
search when doing search+bind authentication.
ldapsearchattribute

    Attribute to match against the user name in the search when doing
search+bind authentication.

    Note: Since LDAP often uses commas and spaces to separate the
different parts of a DN, it is often necessary to use double-quoted
parameter values when configuring LDAP options, for example:

    ldapserver=ldap.example.net ldapprefix="cn=" ldapsuffix=",
dc=example, dc=net"

______________________________________________________________________
Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
Gutl-l@jovenclub.cu
https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l

Responder a