On Thu, Oct 6, 2011 at 9:50 AM, Craig White
<craig.white@ttiltd.com> wrote:
Obviously there is something that I don't understand because I would expect to be able to bind using CN as well as UID attribute...
version: 2.4.21-0ubuntu5.5
***** this as you can see works *****
# ldapsearch -x -D 'uid=cwhite,ou=people,dc=ttinet,dc=local' -W '(uid=cwhite)' uid, cn
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base <dc=ttinet,dc=local> (default) with scope subtree
# filter: (uid=cwhite)
# requesting: uid, cn
#
# cwhite, people, ttinet.local
dn: uid=cwhite,ou=people,dc=ttinet,dc=local
cn: Craig White
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
***** same as above but using cn instead of uid *****
# ldapsearch -x -D 'cn=Craig White,ou=people,dc=ttinet,dc=local' -W '(uid=cwhite)' uid, cn
Enter LDAP Password:
ldap_bind: Invalid credentials (49)
I have to believe that if this is an ACL issue, then the very first rule is the problem...
olcAccess: {0}to attrs=userPassword,shadowLastChange by dn.exact="uid=administ
rator,ou=people,dc=ttinet,dc=local" write by self write by anonymous auth
by * none
What is it that I am missing?
--
Craig White ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ craig.white@ttiltd.com
1.800.869.6908 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ www.ttiassessments.com
Need help communicating between generations at work to achieve your desired success? Let us help!
I guess it not matter of CN or UID, you can only bind using DN and a valid password. The key is DN, your can search DN using any attribute and then do the bind using DN.