[ 
https://issues.apache.org/jira/browse/GUACAMOLE-536?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17480332#comment-17480332
 ] 

Joseph L. Casale commented on GUACAMOLE-536:
--------------------------------------------

Hi Mike,

As per the docs for {*}ldap-user-base-dn{*}:

The base of the DN for all Guacamole users. _This property is absolutely 
required in all cases._ All Guacamole users must be descendents of this base DN.

If a search DN is provided (via {{{}ldap-search-bind-dn{}}}), then Guacamole 
users need only be somewhere within the subtree of the specified user base DN.

If a search DN _is not_ provided, then all Guacamole users must be _direct 
descendents_ of this base DN, as the base DN will be appended to the username 
to derive the user’s DN. For example, if {{ldap-user-base-dn}} is 
“{{{}ou=people,dc=example,dc=net{}}}”, and {{ldap-username-attribute}} is 
“uid”, then a person attempting to login as “{{{}user{}}}” would be mapped to 
the following full DN: “{{{}uid=user,ou=people,dc=example,dc=net{}}}”.

 

We can only perform a subtree search if a bind account (ldap-search-bind-dn) is 
used, otherwise, the distinguished name of the user is inferred and the user 
must reside inside the base dn.

> Add support for arbitrary LDAP bind patterns
> --------------------------------------------
>
>                 Key: GUACAMOLE-536
>                 URL: https://issues.apache.org/jira/browse/GUACAMOLE-536
>             Project: Guacamole
>          Issue Type: Improvement
>          Components: guacamole-auth-ldap
>            Reporter: Joseph L. Casale
>            Assignee: Nick Couchman
>            Priority: Minor
>
> The current LDAP authentication scheme can recursively search the base DN 
> only when a bind DN is used. When biding with the user attempting to log on, 
> the bind DN format pattern is not exposed through configuration which imposes 
> unnatural restrictions forcing the user to exist in a single container.
> If the format pattern was exposed for configuration, for DSA's which allow 
> flexible bind patterns such as Active Directory, configuration could allow 
> "DOMAIN
>  %s" or "%[email protected]" and for those DSA's which do not, you would simply 
> configure the restrictive full DN as the pattern.
> The use case is that we use Active Directory anddo not allow bind accounts so 
> the restriction prevents all users from accessing the application as our 
> topology is not flat (we need to pick a single container therefor excluding 
> everyone else).
> A working Java implementation of an LDAP auth scheme that facilitates this is 
> [Gitblit|http://gitblit.com/properties.html], see the realm.ldap.* 
> configuration properties. Setting the bind pattern to the UPN such as:
> {code:java}
> realm.ldap.bindpattern = ${username}@domain.com
> {code}
> allows the flexible configuration in our Active Directory environment.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to