XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XOCE Integration with OpenLDAP

    Scheduled Pinned Locked Moved Xen Orchestra
    41 Posts 8 Posters 7.2k Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W Offline
      wesleylc1
      last edited by

      Changes made, as below.

      Captura de tela de 2019-06-24 15-12-07.png

      Best regards,
      Wesley Santos

      1 Reply Last reply Reply Quote 0
      • olivierlambertO Offline
        olivierlambert Vates 🪐 Co-Founder CEO
        last edited by

        Why the group name is between < >?

        1 Reply Last reply Reply Quote 0
        • W Offline
          wesleylc1
          last edited by wesleylc1

          I made the changes, but I continue with errors.

          Captura de tela de 2019-06-24 15-26-48.png

          Group settings in "OpenLDAP".

          Captura de tela de 2019-06-24 15-21-35.png

          plugin.test
          {
            "id": "auth-ldap",
            "data": {
              "username": "ws02",
              "password": "* obfuscated *"
            }
          }
          {
            "message": "could not authenticate user",
            "name": "Error",
            "stack": "Error: could not authenticate user
              at _authenticate.then.result (/opt/xen-orchestra/packages/xo-server-auth-ldap/src/index.js:172:14)
              at tryCatcher (/opt/xen-orchestra/node_modules/bluebird/js/release/util.js:16:23)
              at Promise._settlePromiseFromHandler (/opt/xen-orchestra/node_modules/bluebird/js/release/promise.js:517:31)
              at Promise._settlePromise (/opt/xen-orchestra/node_modules/bluebird/js/release/promise.js:574:18)
              at Promise._settlePromise0 (/opt/xen-orchestra/node_modules/bluebird/js/release/promise.js:619:10)
              at Promise._settlePromises (/opt/xen-orchestra/node_modules/bluebird/js/release/promise.js:699:18)
              at _drainQueueStep (/opt/xen-orchestra/node_modules/bluebird/js/release/async.js:138:12)
              at _drainQueue (/opt/xen-orchestra/node_modules/bluebird/js/release/async.js:131:9)
              at Async._drainQueues (/opt/xen-orchestra/node_modules/bluebird/js/release/async.js:147:5)
              at Immediate.Async.drainQueues (/opt/xen-orchestra/node_modules/bluebird/js/release/async.js:17:14)
              at runCallback (timers.js:810:20)
              at tryOnImmediate (timers.js:768:5)
              at processImmediate [as _immediateCallback] (timers.js:745:5)"
          } 
          

          Best regards,
          Wesley Santos

          borzelB 1 Reply Last reply Reply Quote 0
          • olivierlambertO Offline
            olivierlambert Vates 🪐 Co-Founder CEO
            last edited by

            I don't think that's the right syntax. But it's not a XO issue, it's a LDAP setting issue. Check what filter would work with your LDAP server, and it will work.

            W 1 Reply Last reply Reply Quote 0
            • borzelB Offline
              borzel XCP-ng Center Team @wesleylc1
              last edited by

              @wesleylc1 maybe the memberOf= needs a LDAP-Value like CN=blabla,OU=yadayada,DC=whatever?

              1 Reply Last reply Reply Quote 0
              • W Offline
                wesleylc1 @olivierlambert
                last edited by

                @olivierlambert
                I think the error is related to the attributes of "OpenLDAP", but I'm not sure how to filter.

                1 Reply Last reply Reply Quote 0
                • olivierlambertO Offline
                  olivierlambert Vates 🪐 Co-Founder CEO
                  last edited by

                  You need to find/read documentation on LDAP filter for your server. Then it will work šŸ™‚

                  1 Reply Last reply Reply Quote 0
                  • W Offline
                    wesleylc1
                    last edited by

                    Dear, is it possible to search with the "group and users" option?
                    Best regards,
                    Wesley Santos

                    julien-fJ 1 Reply Last reply Reply Quote 0
                    • julien-fJ Offline
                      julien-f Vates 🪐 Co-Founder XO Team @wesleylc1
                      last edited by

                      @wesleylc1 As @olivierlambert said, this is an LDAP config issue, you need to know the structure of your LDAP server.

                      The auth-ldap plugin comes with a CLI which is useful to test various configuration and figure out what is wrong:

                      $ /usr/local/lib/node_modules/xo-server-auth-ldap/dist/test-cli.js
                      ? uri 
                      
                      1 Reply Last reply Reply Quote 0
                      • W Offline
                        wesleylc1
                        last edited by

                        Dear @julien-f ,

                        I was able to perform the integration with "OpenLDAP", but I can not apply the filter using "" memberOf "", I could identify, the filter does not occur because my "LDAP" uses old parameters, filters using the "memberUid" attribute. You have some examples of how I can apply to filter group users with the "memberUid" attribute.

                        Best regards,
                        Wesley Santos

                        julien-fJ 1 Reply Last reply Reply Quote 0
                        • julien-fJ Offline
                          julien-f Vates 🪐 Co-Founder XO Team @wesleylc1
                          last edited by

                          @wesleylc1 It really depends of the structure of your LDAP server.

                          I've just committed a new version of the plugin which makes the test CLI displays the matched entry on success, this helps figuring out what should be put in the filter field.

                          Example:

                          $ xo-server-auth-ldap
                          ? uri ldap://ldap.company.net
                          ? fill optional certificateAuthorities? No
                          ? fill optional checkCertificate? No
                          ? fill optional bind? No
                          ? base ou=people,dc=company,dc=net
                          ? fill optional filter? No
                          configuration saved in ./ldap.cache.conf
                          ? Username john.smith
                          ? Password [hidden]
                          searching for entries...
                          .
                          1 entries found
                          attempting to bind as uid=john.smith,ou=people,dc=company,dc=net
                          successfully bound as uid=john.smith,ou=people,dc=company,dc=net => john.smith authenticated
                          {
                            "messageID": 1,
                            "protocolOp": "SearchEntry",
                            "objectName": "uid=john.smith,ou=people,dc=company,dc=net",
                            "attributes": [
                              {
                                "type": "cn",
                                "vals": [
                                  "John Smith"
                                ]
                              },
                              {
                                "type": "gidNumber",
                                "vals": [
                                  "10000"
                                ]
                              },
                              {
                                "type": "givenName",
                                "vals": [
                                  "John"
                                ]
                              },
                              {
                                "type": "homeDirectory",
                                "vals": [
                                  "/home/john.smith"
                                ]
                              },
                              {
                                "type": "initials",
                                "vals": [
                                  "JSH"
                                ]
                              },
                              {
                                "type": "loginShell",
                                "vals": [
                                  "/bin/bash"
                                ]
                              },
                              {
                                "type": "mail",
                                "vals": [
                                  "john.smith@company.net"
                                ]
                              },
                              {
                                "type": "objectClass",
                                "vals": [
                                  "posixAccount",
                                  "inetOrgPerson",
                                  "organizationalPerson",
                                  "person"
                                ]
                              },
                              {
                                "type": "sn",
                                "vals": [
                                  "Smith"
                                ]
                              },
                              {
                                "type": "uid",
                                "vals": [
                                  "john.smith"
                                ]
                              },
                              {
                                "type": "uidNumber",
                                "vals": [
                                  "10000"
                                ]
                              }
                            ],
                            "controls": []
                          }
                          
                          W 1 Reply Last reply Reply Quote 0
                          • W Offline
                            wesleylc1
                            last edited by wesleylc1

                            @julien-f With this test option would be perfect to find out which filter should I use, how do I update to this version of the plugin?

                            ? uri 192.168.XX.XX
                            ? fill optional certificateAuthorities? No
                            ? fill optional checkCertificate? No
                            ? fill optional bind? No
                            ? base ou=BH,o=PRJ,c=BR
                            ? fill optional filter? No
                            configuration saved in ./ldap.cache.conf
                            ? Username cn=adm,c=br
                            ? Password [hidden]
                            āœ– 192.168.xx.xx is an invalid LDAP url (protocol)
                            TypeError: 192.168.XX.XX is an invalid LDAP url (protocol)
                                at Object.parse (/opt/xen-orchestra/node_modules/ldapjs/lib/url.js:16:13)
                                at new Client (/opt/xen-orchestra/node_modules/ldapjs/lib/client/client.js:310:16)
                                at createClient (/opt/xen-orchestra/node_modules/ldapjs/lib/client/index.js:54:12)
                                at /opt/xen-orchestra/packages/xo-server-auth-ldap/dist/index.js:204:47
                                at Generator.next (<anonymous>)
                                at asyncGeneratorStep (/opt/xen-orchestra/packages/xo-server-auth-ldap/dist/index.js:24:103)
                                at _next (/opt/xen-orchestra/packages/xo-server-auth-ldap/dist/index.js:26:194)
                                at /opt/xen-orchestra/packages/xo-server-auth-ldap/dist/index.js:26:364
                                at new Promise (<anonymous>)
                                at /opt/xen-orchestra/packages/xo-server-auth-ldap/dist/index.js:26:97
                            
                            

                            Best regards,
                            Wesley Santos

                            1 Reply Last reply Reply Quote 0
                            • julien-fJ Offline
                              julien-f Vates 🪐 Co-Founder XO Team
                              last edited by

                              It depends how you installed it, unfortunately I cannot help you for this.

                              Once you've upgrade to the latest version, use the default filter to authenticate the user and then you will see what fields it contains, then you will be able to write the correct filter.

                              1 Reply Last reply Reply Quote 0
                              • W Offline
                                wesleylc1
                                last edited by wesleylc1

                                @julien-f @DustinB

                                I performed the installation through the link below.

                                https://github.com/Jarli01/xenorchestra_installer

                                the version of the updated plugin is already available in the Jarli repositories?

                                Best regards,
                                Wesley Santos

                                1 Reply Last reply Reply Quote 0
                                • W Offline
                                  wesleylc1
                                  last edited by

                                  @julien-f Can you list what types of filters are supported by the plugin?

                                  julien-fJ 1 Reply Last reply Reply Quote 0
                                  • julien-fJ Offline
                                    julien-f Vates 🪐 Co-Founder XO Team @wesleylc1
                                    last edited by

                                    @wesleylc1 I'm not an expert, but it's a standard LDAP filter which is evaluated by the LDAP server, no special handling is done by the plugin itself.

                                    1 Reply Last reply Reply Quote 0
                                    • W Offline
                                      wesleylc1 @julien-f
                                      last edited by wesleylc1

                                      @julien-f How can I download the new version of the plugin, according to the output below, I can not automatically query the filters through the script "/test-cli.js".

                                      ? uri ldap://192.168.xx.xx
                                      ? fill optional certificateAuthorities? No
                                      ? fill optional checkCertificate? No
                                      ? fill optional bind? Yes
                                      ? bind > dn cn=admin,c=br
                                      ? bind > password  XXXX
                                      ? base ou=XX,o=PRJ,c=BR
                                      ? fill optional filter? Yes
                                      ? filter (&(cn=gp-ti-infra)(memberUID={{name}}))
                                      configuration saved in ./ldap.cache.conf
                                      ? Username user01
                                      ? Password [hidden]
                                      attempting to bind with as cn=admin,c=br...
                                      successfully bound as cn=admin,c=br
                                      searching for entries...
                                      .
                                      1 entries found
                                      attempting to bind as cn=gp-ti-test,ou=Grupos,ou=XX,o=PRJ,c=BR
                                      failed to bind as cn=gp-ti-test,ou=Grupos,ou=XX,o=PRJ,c=BR: Invalid Credentials
                                      could not authenticate user1
                                      
                                      
                                      1 Reply Last reply Reply Quote 0
                                      • julien-fJ Offline
                                        julien-f Vates 🪐 Co-Founder XO Team
                                        last edited by

                                        @wesleylc1 For the upgrade, you need to ask the people behind the install script you used.

                                        Concerning the output, it will only show the entry if the authentication was successful, that's why you need to start by using the default filter.

                                        W 1 Reply Last reply Reply Quote 0
                                        • W Offline
                                          wesleylc1 @julien-f
                                          last edited by

                                          The default filter is (uid = {{name}})?

                                          1 Reply Last reply Reply Quote 0
                                          • W Offline
                                            wesleylc1
                                            last edited by

                                            @julien-f the filter "(& (cn = gp-ti-test) (memberUID = {{name}}))" is to release access to users of a group but "bind as" is not being mounted as it should

                                            ? uri ldap://192.168.XX.XX
                                            ? fill optional certificateAuthorities? No
                                            ? fill optional checkCertificate? No
                                            ? fill optional bind? Yes
                                            ? bind > dn cn=adm,c=br
                                            ? bind > password *****
                                            ? base ou=BH,o=PRJ,c=BR
                                            ? fill optional filter? Yes
                                            ? filter (&(cn=gp-ti-teste)(memberUID={{name}}))
                                            configuration saved in ./ldap.cache.conf
                                            ? Username user1
                                            ? Password [hidden]
                                            attempting to bind with as cn=adm,c=br...
                                            successfully bound as cn=adm,c=br
                                            searching for entries...
                                            .
                                            1 entries found
                                            attempting to bind as cn=gp-ti-teste,ou=Grupos,ou=BH,o=PRJ,c=BR
                                            failed to bind as cn=gp-ti-teste,ou=Grupos,ou=BH,o=PRJ,c=BR: Invalid Credentials
                                            could not authenticate user1
                                            
                                            

                                            Best regards,
                                            Wesley Santos

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post