Open ravindk89 opened 6 months ago
Engineer notes - sAMAccountName
is a microsoft AD/LDAP filter item. Other AD/LDAP implementations may have different filter / categories. May need to check the LDAP spec for something more universal, or just note that this value should reflect the AD/LDAP object config
https://www.ietf.org/rfc/rfc2798.txt should be standard but there's not a ton here that is easy to work with from a login perspective - or at least, I am not sure how the console would handle passing in something like the displayName
as a login. I suppose this is up to the user in the end.
@ravindk89 It's very difficult to give a standard set of search filters as it depends on the directory schema used.
We can also document using mc admin trace -v -a --funcname 'sts.AssumeRole*' ALIAS as a way to trace LDAP auth attempts as they go through the process.
This would solve many problems for users as they will be able to the most common issue - no policy attached!
While working on AD/LDAP customer requests we noted that there are some
ldapquery
setups that can help test how MinIO would/should behave with a given configuration.-H
server_addr
-b
user_dn_search_base_dn
,group_search_base_dn
-D
ldap_bind_dn
-W
ldap_bind_password
user_dn_search_filter
orgroup_search_filter
Examples:
is equivalent to
For groups you can set the
-b
to the group base search and set the search filter to something like(&(objectClass=group)(member='DN'))
and see whether groups get returned and/or have a given user as a member of that group.This may help users in figuring out how to set up their user/group lookups and then translate them to a working MinIO config.
We can also document using
mc admin trace -v -a --funcname 'sts.AssumeRole*' ALIAS
as a way to trace LDAP auth attempts as they go through the process.