diff options
author | Rich Megginson <rmeggins@redhat.com> | 2008-11-05 18:21:06 +0000 |
---|---|---|
committer | Rich Megginson <rmeggins@redhat.com> | 2008-11-05 18:21:06 +0000 |
commit | 16c994ace5d2eb635bf3847b5fe4c96c46fdd8a2 (patch) | |
tree | e039e7e872d256c18ba0deeb745f32712612b049 /ldap/servers/slapd/slapi-private.h | |
parent | 7e35a10850563a5cd61289b4330279b69b087128 (diff) | |
download | ds-16c994ace5d2eb635bf3847b5fe4c96c46fdd8a2.tar.gz ds-16c994ace5d2eb635bf3847b5fe4c96c46fdd8a2.tar.xz ds-16c994ace5d2eb635bf3847b5fe4c96c46fdd8a2.zip |
Resolves: bug 469261
Bug Description: Support server-to-server SASL - part 2
Reviewed by: nhosoi (Thanks!)
Fix Description: This part focuses on chaining backend - allowing the mux server to use SASL to connect to the farm server, and allowing SASL authentication to chain. I had to add two new config parameters for chaining:
nsUseStartTLS - on or off - tell connection to use startTLS - default is off
nsBindMechanism - if absent, will just use simple auth. If present, this must be one of the supported mechanisms (EXTERNAL, GSSAPI, DIGEST-MD5) - default is absent (simple bind)
The chaining code uses a timeout, so I had to add a timeout to slapi_ldap_bind, and correct the replication code to pass in a NULL for the timeout parameter.
Fixed a bug in the starttls code in slapi_ldap_init_ext.
The sasl code uses an internal search to find the entry corresponding to the sasl user id. This search could not be chained due to the way it was coded. So I added a new chainable component called cn=sasl and changed the sasl internal search code to use this component ID. This allows the sasl code to work with a chained backend. In order to use chaining with sasl, this component must be set in the chaining configuration nsActiveChainingComponents. I also discovered that password policy must be configured too, in order for the sasl code to determine if the account is locked out.
I fixed a bug in the sasl mapping debug trace code.
Still to come - sasl mappings to work with all of this new code - kerberos code improvements - changes to pta and dna
Platforms tested: Fedora 8, Fedora 9
Flag Day: yes
Doc impact: yes
Diffstat (limited to 'ldap/servers/slapd/slapi-private.h')
-rw-r--r-- | ldap/servers/slapd/slapi-private.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/ldap/servers/slapd/slapi-private.h b/ldap/servers/slapd/slapi-private.h index 7820db52..ccd98554 100644 --- a/ldap/servers/slapd/slapi-private.h +++ b/ldap/servers/slapd/slapi-private.h @@ -720,6 +720,7 @@ struct slapi_componentid * plugin_get_default_component_id(); #define COMPONENT_RESLIMIT "cn=resource limits,"COMPONENT_BASE_DN #define COMPONENT_PWPOLICY "cn=password policy,"COMPONENT_BASE_DN #define COMPONENT_CERT_AUTH "cn=certificate-based authentication,"COMPONENT_BASE_DN +#define COMPONENT_SASL "cn=sasl,"COMPONENT_BASE_DN /* Component names for logging */ #define SLAPI_COMPONENT_NAME_NSPR "Netscape Portable Runtime" |