[JIRA] [ldap-plugin] (JENKINS-31422) Manager DN ignored in LDAP Plugin Configuration

6 views
Skip to first unread message

alan.moran@gmx.net (JIRA)

unread,
Nov 5, 2015, 11:31:11 AM11/5/15
to jenkinsc...@googlegroups.com
Alan Moran created an issue
 
Jenkins / Bug JENKINS-31422
Manager DN ignored in LDAP Plugin Configuration
Issue Type: Bug Bug
Assignee: Kohsuke Kawaguchi
Components: ldap-plugin
Created: 05/Nov/15 4:30 PM
Priority: Major Major
Reporter: Alan Moran

The following is our current setup:

Jenkins with the latest LDAP plugin (as per 05.11.2015) in which we have configured:

  • Server (in the form host:port)
  • root DN (comprising of two "dc" components)
  • Allow blank DN (checked)
  • User search base (comprising of relative path with two components, "ou", "o" and no leading/trailing commas)
  • user search filter (uid= {0}

    )

  • Manager DN with fully qualified DN
  • Manager Password
  • Display Name LDAP Attribute (displayName)
  • Email Address LDAP Attribtue (mail)

All other fields blank or unchecked.

We have two types of user in our LDAP. The Manager DN who when bound can browse the entire tree and regular users who can bind but cannot browse at all (for security reasons). Anonymous connection is permitted. All connection parameters are verified independently (e.g., using Apache Directory Studio)

Here is the problem: regular users cannot authenticate.

Here is what we found: when we login using the Manager DN (i.e., just the "uid" part as login name) we gain access to Jenkins - this was just a test since this is not ordinarily a user that we would want to use to connect to Jenkins but it is one with liberal browsing rights. When we connect with a regular user, it would appear that an anonymous bind occurs but that an "Insufficient Access Rights" error is raised. In order words, the fact that we have configured the Manager DN does not appear to be relevant since this is never used during the bind and subsequent operations. Owing to policy constraints we are neither able to block anonymous binds nor loosen up regular user browsing rights.

What we would like is that the Manager DN perform any compare/retrievals or other operations that Jenkins requires and that the bind is performed using the user supplied credentials.

What can we do? e.g., configuration or code changes?

Add Comment Add Comment
 
This message was sent by Atlassian JIRA (v6.4.2#64017-sha1:e244265)
Atlassian logo

alan.moran@gmx.net (JIRA)

unread,
Nov 11, 2015, 8:54:02 AM11/11/15
to jenkinsc...@googlegroups.com
Alan Moran commented on Bug JENKINS-31422
 
Re: Manager DN ignored in LDAP Plugin Configuration

If necessary I am happy to test any proposed changes in code. Just package code as plugin and advise accordingly.

alan.moran@gmx.net (JIRA)

unread,
Jan 15, 2016, 3:40:03 AM1/15/16
to jenkinsc...@googlegroups.com

A server side solution/workaround has been found. From my point of view this issue can be closed.

alan.moran@gmx.net (JIRA)

unread,
Jan 15, 2016, 3:41:01 AM1/15/16
to jenkinsc...@googlegroups.com
Alan Moran resolved as Fixed
 

Server side solution based on ACL configuration has resolved the issue.

Change By: Alan Moran
Status: Open Resolved
Resolution: Fixed

alan.moran@gmx.net (JIRA)

unread,
Jan 15, 2016, 3:41:02 AM1/15/16
to jenkinsc...@googlegroups.com
Alan Moran closed an issue as Fixed
 

Workaround provides adequate resolution without altering the application code.

Change By: Alan Moran
Status: Resolved Closed

mig@mig5.net (JIRA)

unread,
Mar 3, 2020, 11:36:03 PM3/3/20
to jenkinsc...@googlegroups.com
Mig Jacq commented on Bug JENKINS-31422
 
Re: Manager DN ignored in LDAP Plugin Configuration

Alan Moran what ACL change did you do for this? Did you effectively grant 'read' access to 'self' for the entire LDAP object (e.g the user)?

This message was sent by Atlassian Jira (v7.13.12#713012-sha1:6e07c38)
Atlassian logo
Reply all
Reply to author
Forward
0 new messages