Windows auth_active_directory #1464
Replies: 6 comments 10 replies
-
Hello @mbaldazzi85. We added some code to auth to AD in a branch some time ago but I don't think it got to the release because of lack of testing on a real Active Directory Server.
We need some help here, and thought this is not in our priority list I will work on it if we get some error report. It is a really good new feature to add and most of the work has already been done. Thanks ! |
Beta Was this translation helpful? Give feedback.
-
Hello! I have read the documentation and also checking in this github documentation, but it make me more confused... |
Beta Was this translation helpful? Give feedback.
-
Hello @AKA9124 . We started with this feature but it was left behind because we couldn't test it properly. We had recently an issue with an user who I guess configured the LDAP settings in Ravada to match AD. See if it works. If not I will resurrect this old branch in the next beta release. |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Hello @AKA9124 , it is fantastic you managed to login this way.
Well, it looks like Windows AD doesn't like the way we create groups. I wonder if you tried any other type of groups like groupOfUniqueNames or posixGroup . Watching the second screenshot, I am not user what you trying to do. I guess you are creating the group from within the AD manager itself. That would be a good option. If you manage to do that and inspect how this group is created and how members are added to it we could use it. Even if I had to tweak the code somehow. There is a way to dump the contents of an LDAP entry from within Ravada CLI typing this: Come on, it will not be easy but I am sure we will get something great for AD here. Thanks for your help ! |
Beta Was this translation helpful? Give feedback.
-
@AKA9124 you did it great. It is amazing you found about this primaryGroupID attribute. Thank you very much for explaining it so well. I will add a task so we can research AD a little bit more and manage this groups the same we do with LDAP ones. Meanwhile I will write a new AD entry in the docs. Can we reuse part of your text and screenshots ? We will properly credit your name. |
Beta Was this translation helpful? Give feedback.
-
follow this way:
https://ravada.readthedocs.io/en/latest/docs/auth_active_directory.html#admin-users
apt-get install libtest-spelling-perl
apt-get install cpanminus
cpanm Auth::ActiveDirectory
in the /etc/ravada.conf had add
ldap:
server: 192.168.242.102
port: 389
domain: pippo.local
principal: [email protected]
always fails...
Anyone know a way to test authentication from the CLI?
Beta Was this translation helpful? Give feedback.
All reactions