Hi Christina,
Worked like a charm. I suggest updating the documentation
(
http://pki.fedoraproject.org/wiki/Directory-Authenticated_Profiles)
mentioning the tag ldapBoundConn=true (there is no reference for it). Also,
I've noticed that the authentication is based on uid ldap attribute ... is
there any way of changing it to authenticate against sAMAccountName
(Microsoft Active Directory attribute)? I didn't find any tag to define the
attribute I want to authenticate against.
Thank you once more
sergio
Date: Mon, 1 Aug 2016 14:18:50 -0700
From: Christina Fu <cfu(a)redhat.com>
To: pki-users(a)redhat.com
Subject: Re: [Pki-users] setting up Directory-based authentication
Message-ID: <50d8356b-7507-8c99-db1d-72c7fd4ea2b8(a)redhat.com>
Content-Type: text/plain; charset="windows-1252"; Format="flowed"
Hi Sergio,
I'm not sure if this has ever made it into dogtag document, but here is the
instruction I have written for bound LDAP based authentication.  I can't say
that I remember every detail, but it's what I have written down anyway ;-/
In some environment, one might want to disallow anonymous bind for the ldap
server that is used for authentication.  To create a bound connection
between a CA and the ldap server, you need to make a few configuration
changes:
  *
    Set up directory-based authentication as following example in CS.cfg:
     1.
        auths.instance.UserDirEnrollment.ldap.ldapBoundConn=true
        auths.instance.UserDirEnrollment.ldap.ldapauth.authtype=BasicAuth
        auths.instance.UserDirEnrollment.ldap.ldapauth.bindDN=cn=Directory
        Manager
 
auths.instance.UserDirEnrollment.ldap.ldapauth.bindPWPrompt=externalLDAP
        externalLDAP.authPrefix=auths.instance.UserDirEnrollment
        cms.passwordlist=internaldb,replicationdb,externalLDAP
where the bindPWPrompt is the ?tag? or ?prompt? that is used in the
password.conf file; It is also the name used under the passwordlist and the
authPrefix
  *
    Add the ?tag? or ?prompt? from the CS.cfg with its password in the
    password.conf:
      o
        externalLDAP=<your password>
Please try it out and let us know if it works or need any clarification.
Hope this helps,
Christina
On 07/26/2016 06:01 AM, S?rgio Pereira wrote:
 Hi there,
 I?m having a hard time setting up the directory-based authentication 
 for dogtag 10.3.3-1. I did follow the instructions as 
 
http://pki.fedoraproject.org/wiki/Directory-Authenticated_Profiles and 
 I get an error when trying to bind/authenticate against directory 
 service (Microsoft AD2008) as follows:
 [26/Jul/2016:08:27:27][http-bio-8443-exec-1]: DirBasedAuthentication: 
 authenticate: before authenticate() call
 [26/Jul/2016:08:27:27][http-bio-8443-exec-1]: Authenticating 
 UID=john.luk
 [26/Jul/2016:08:27:27][http-bio-8443-exec-1]: UidPwdDirAuthentication: 
 Authenticating: Searching for uid=john.luk base 
 DN=OU=IT,dc=domain,dc=com
 [26/Jul/2016:08:27:27][http-bio-8443-exec-1]: Authenticating: User 
 authentication failure: netscape.ldap.LDAPException: error result (1);
 000004DC: LdapErr: DSID-0C0906DD, comment: In order to perform this 
 operation a successful bind must be completed on the connection., data 
 0, v1772
 [26/Jul/2016:08:27:27][http-bio-8443-exec-1]: Authenticating: closing 
 bad connection
 The directives (bellow) are used to bind the AD2008 and I already 
 tested the account and it is working.
 auths.instance.UserDirEnrollment.ldap.ldapauth.bindDN=cn=Service
 Account,ou=IT,dc=domain,dc=com
 auths.instance.UserDirEnrollment.ldap.ldapauth.bindPWPrompt=password
 John Luk is applying for the certificate using the web enrollment 
 process (caDirUserCert profile).
 What am I missing?
 Thx,
 sergio
 _______________________________________________
 Pki-users mailing list
 Pki-users(a)redhat.com
 
https://www.redhat.com/mailman/listinfo/pki-users