mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 08:15:52 +03:00
[GH-ISSUE #139] Unable to authenticate against lldap from IPMI Controller #58
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#58
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Leppunen on GitHub (Apr 19, 2022).
Original GitHub issue: https://github.com/lldap/lldap/issues/139
I'm trying to make my home server's IPMI controller to authenticate against lldap, where the ldap group 'admin' is mapped to the IPMI administrator group, and noticed that lldap cannot handle the search filter used by the IPMI. lldap debug log is below.
@nitnelave commented on GitHub (Apr 19, 2022):
It seems that it's trying to get "groupOfNames", but the LLDAP groups are "groupOfUniqueNames". Is that something that you can configure? Otherwise I can adapt the filters to match. I'll definitely improve the error message, it should be a valid filter that returns nothing (since the condition is valid but does not match anything).
@Leppunen commented on GitHub (Apr 19, 2022):
I have no configurability for that behaviour. i can only specify most basic things like locations of groups/users etc.
@nitnelave commented on GitHub (Apr 19, 2022):
Well, technically it's an issue with IPMI, but I'm willing to be a bit more flexible and allow the groups to also be listed as groupOfNames.
@Leppunen commented on GitHub (Apr 19, 2022):
I tested this change and it looks like i can successfully authenticate against lldap now. Many thanks! 👍