Open stevenlafl opened 2 years ago
Thanks for the docker image.
I'm getting lots of errors with an LDIF file from AD. When I remove problematic attributes which may be custom to this instance, eventually I get this:
adding new entry "DC=contoso,DC=corp"
ldap_add: Object class violation (65)
additional info: attribute 'gPLink' not allowed
gPLink is definitely not a custom attribute and it seems to be included in the schema. In this case the LDIF file only contains the domain object. What's wrong here?
Thanks for the docker image.
I'm getting lots of errors with an LDIF file from AD. When I remove problematic attributes which may be custom to this instance, eventually I get this:
adding new entry "DC=contoso,DC=corp" ldap_add: Object class violation (65) additional info: attribute 'gPLink' not allowed
gPLink is definitely not a custom attribute and it seems to be included in the schema. In this case the LDIF file only contains the domain object. What's wrong here?
I haven't actually tried any setup with GPOs in it. Do you have an example snippet from your LDIF that contains the portion which is erroring?
I am expecting something like...
dn: dc=contoso,dc=corp
objectClass: top
objectClass: customDomain
dc: contoso
gPLink: [LDAP://cn={GUID of GPO},cn=policies,cn=system,DC=contoso,DC=corp;0]
Replacing of course //cn={GUID of GPO}
with cn=SOME-GUID
?
Yes, that is what it looks like. Unfortunately I cannot share this data and sanitizing is non-trivial. However, I found a lot of other missing attributes. I opened a dedicated issue here: https://github.com/dkoudela/active-directory-to-openldap/issues/10
Thanks for the reply anyway!
I hope this serves to help someone.
Here's an example to run it. It will stand up a LDAP server. You could just run it in place of a different OpenLDAP docker. I can't really say much as to the correctness, so @dkoudela will have to help sanity check the result.
Querying it I get:
And authenticated use: