mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 08:15:52 +03:00
[GH-ISSUE #602] How to integrate UrBackup and lldap? #222
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#222
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @arbdevml on GitHub (Jun 11, 2023).
Original GitHub issue: https://github.com/lldap/lldap/issues/602
Hello.
First of all thank you very much for this project.
UrBackup - Open Source client/server backup system
https://www.urbackup.org
Test login failed.
Error: Login denied(ec=67),
LDAP remote: bind failed Success Not a subtree of the base tree
UrBackup config:
Could you offer some advice how to integrate lldap and UrBackup?
Thank you very much for your answer.
@nitnelave commented on GitHub (Jun 12, 2023):
Hi! I tried to find their doc for LDAP settings, but couldn't find anything, so I'll give it my best guess. However, it would really help if you could enable verbose mode in LLDAP and post the logs from trying to use UrBackup.
Some changes I'd make:
uid=ou=people,dc=example, dc=com(member={USERNAME})(or maybe(member=uid={USERNAME},ou=people,dc=example,dc=com)).uidTell me how that works, and post the LLDAP logs. And if you have trouble, feel free to join the discord for more interactive help.
@arbdevml commented on GitHub (Jun 12, 2023):
Thank you very much for your answer.
Environment configuration below:
#promiscuous mode enabled
#docker-compose.yml
UrBackup config:
UrBackup log:
ERROR: Login via LDAP failed: Login denied(ec=67), LDAP remote: bind failed Success Too many elements in distinguished name: ""uid"", ""adminou"", ""people""lldap log:
Thank you very much for your answer.
@nitnelave commented on GitHub (Jun 12, 2023):
Oh, wow, they do extremely basic string concatenation. Try to add a comma at the beginning of the suffix:
,ou=people,dc=example, dc=com@arbdevml commented on GitHub (Jun 12, 2023):
nitnelave, thank you very much for your help.
UrBackup config:
UrBackup log:
ERROR: Login via LDAP failed: LDAP: search failed(ec=39), LDAP remote: search failed Success Too many elements in distinguished name: ""member"", ""uid"", ""admin""lldap log:
@arbdevml commented on GitHub (Jun 12, 2023):
nitnelave, thank you very much for your help.
On the UrBackup forum I have found this information:
https://forums.urbackup.org/t/active-directory-and-urbackup/809/11
LDAP/AD user name prefix
What gets prepended to the username when logging in usually “firmenname”.
LDAP/AD user name suffix
Can be left empty.
LDAP/AD group and class query --> “DC=example,DC=com…”
Change to your choice of domain name. E.g. DC=firmenname,DC=de
https://forums.urbackup.org/t/ldap-server-bind/10047/4
DC=home,DC=intern?memberOf,objectClass?sub?(sAMAccountName={USERNAME})
Here you can simply change “sAMAccountName” to whatever you want the username to be queried from.
https://forums.urbackup.org/t/cannot-open-backups-using-an-ldap-account/6988/2
The mapping to administrator (“all=all”) failed and it falls back to normal user authentication.
@martadinata666 commented on GitHub (Jun 12, 2023):
This is as far i can get, the problem is all user will be admin??? 🤔
@arbdevml commented on GitHub (Jun 12, 2023):
martadinata666, thank you very much for your help.
UrBackup config:
Test login succeeded. Rights of user: all=all
@arbdevml commented on GitHub (Jun 12, 2023):
martadinata666, thank you very much for your help.
What do you think about this users restriction:
Administrator users: internal storage;
Users from LDAP: restricted group rights map.
@martadinata666 commented on GitHub (Jun 12, 2023):
I dunno how this translate to urbackup permission, as a client
that logged via LDAP, I prefer simple.Then there is this https://www.urbackup.org/administration_manual.html#x1-190004.1 maybe it set on the LDAP
*==>all=allthings, but technically this is personal preferences on how client can/can't do.@martadinata666 commented on GitHub (Jun 12, 2023):
What I'm curious is:
LDAP/AD class rights maphow/when this affect LDAP login. 🤔As the one that can set permission is
LDAP/AD group rights map:My current LDAP/AD group rights map
cn=lldap_urbackup,*==>browse_backups=all,start_backup=all,status=all,logs=all,progress=all,stop_backup=all,lastacts=all