<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Ambari – AD LDS (LDAP) integration in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96406#M9885</link>
    <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/375/oszabo.html" nodeid="375"&gt;@oszabo@hortonworks.com&lt;/A&gt; is in the process of troubleshooting some other LDAP related items at the moment and may be able to comment, but I will get an internal JIRA filed for this and we'll have to get it slated.&lt;/P&gt;</description>
    <pubDate>Wed, 04 Nov 2015 06:42:38 GMT</pubDate>
    <dc:creator>pcodding</dc:creator>
    <dc:date>2015-11-04T06:42:38Z</dc:date>
    <item>
      <title>Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96398#M9877</link>
      <description>&lt;PRE&gt;Hi,&lt;/PRE&gt;&lt;P&gt;
I have setup Ambari integration with LDAP (AD LDS) and user &amp;amp; group sync working fine but I am not able to logging into ambari web using my AD LDS user and password. After further debugging, I have found that “Bind is success but User does not have read access on their own user object attributes from AD LDS”. After discussing with AD LDS admin team, they confirmed modifying the security on the AD LDS directory is not an option. Does ambari works if the logged in user not having read access on their own user object attributes? Can we customize ambari user  web login (spring security) behaviour? &lt;/P&gt;&lt;PRE&gt;
Ambari ldap configuration in ambari.properties
============================================== api.authenticate=true
authentication.ldap.baseDn=DC=jcs,DC=com
authentication.ldap.bindAnonymously=false authentication.ldap.dnAttribute=distinguishedName authentication.ldap.groupMembershipAttr=member; authentication.ldap.groupNamingAttr=cn authentication.ldap.groupObjectClass=group
authentication.ldap.managerDn=CN=&amp;lt;manager DN&amp;gt;,OU=ApplAccounts,OU=Applications,DC=jcs,DC=com
authentication.ldap.managerPassword=/etc/ambari-server/conf/ldap-password.dat
authentication.ldap.primaryUrl=adlds.jcs.com:636 authentication.ldap.referral=ignore
authentication.ldap.useSSL=true
authentication.ldap.userObjectClass=user authentication.ldap.usernameAttribute=cn bootstrap.dir=/var/run/ambari-server/bootstrap bootstrap.script=/usr/lib/python2.6/site-packages/ambari_server/bootstrap.py
bootstrap.setup_agent.script=/usr/lib/python2.6/site-packages/ambari_server/setupAgent.py
client.security=ldap &lt;/PRE&gt;&lt;P&gt;Error Log: &lt;/P&gt;&lt;P&gt;============ &lt;/P&gt;&lt;P&gt;28 Oct 2015 12:16:51,900 DEBUG [qtp-client-22 - /api/v1/users/cmmuriat?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name&amp;amp;_=1446052611633] AbstractContextSource:259 - Got Ldap context on server 'ldaps://adlds.jcs.com:636/dc=jcs,dc=com'
28 Oct 2015 12:16:51,904 DEBUG [qtp-client-22 - /api/v1/users/cmmuriat?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name&amp;amp;_=1446052611633] SpringSecurityLdapTemplate:213 - &lt;STRONG&gt;Searching for entry under DN 'dc=jcs,dc=com', base = '', filter = '(cn={0})' &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;28 Oct 2015 12:16:51,905 DEBUG [qtp-client-22 - /api/v1/users/cmmuriat?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name&amp;amp;_=1446052611633] SpringSecurityLdapTemplate:229 - &lt;STRONG&gt;Found DN: cn=cmmuriat,ou=JIPeople&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;28 Oct 2015 12:16:51,909 DEBUG [qtp-client-22 - /api/v1/users/cmmuriat?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name&amp;amp;_=1446052611633] BindAuthenticator:108 - &lt;STRONG&gt;Attempting to bind as cn=cmmuriat,ou=JIPeople,dc=jcs,dc=com &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;28 Oct 2015 12:16:52,172 DEBUG [qtp-client-22 - /api/v1/users/cmmuriat?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name&amp;amp;_=1446052611633] AbstractContextSource:259 - &lt;STRONG&gt;Got Ldap context on server 'ldaps://adlds.jcs.com:636/dc=jcs,dc=com' &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;28 Oct 2015 12:16:52,172 DEBUG [qtp-client-22 - /api/v1/users/cmmuriat?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name&amp;amp;_=1446052611633] BindAuthenticator:116 - &lt;STRONG&gt;Retrieving attributes... &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;28 Oct 2015 12:16:52,180 DEBUG [qtp-client-22 - /api/v1/users/cmmuriat?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name&amp;amp;_=1446052611633] AmbariLdapAuthenticationProvider:62 - Got exception during LDAP authentification attempt
org.springframework.security.authentication.InternalAuthenticationServiceException: [LDAP: error code 32 - 0000208D: NameErr: DSID-031522C9, problem 2001 (NO_OBJECT), data 0, best match of:
        'DC=jcs,DC=com'
^@]; nested exception is javax.naming.NameNotFoundException: [LDAP: error code 32 - 0000208D: NameErr: DSID-031522C9, problem 2001 (NO_OBJECT), data 0, best match of:
        'DC=jcs,DC=com'
^@]; remaining name 'cn=cmmuriat,ou=JIPeople'&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 09:05:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96398#M9877</guid>
      <dc:creator>rtummuri</dc:creator>
      <dc:date>2015-11-03T09:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96399#M9878</link>
      <description>&lt;P&gt;@&lt;A href="http://community.hortonworks.com/users/486/rtummuri.html"&gt;rtummuri@hortonworks.com&lt;/A&gt; Please remove the customer reference in the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 09:08:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96399#M9878</guid>
      <dc:creator>nsabharwal</dc:creator>
      <dc:date>2015-11-03T09:08:12Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96400#M9879</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/486/rtummuri.html" nodeid="486"&gt;@rtummuri@hortonworks.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;Any chance of using different DN who has atleast read access?&lt;/P&gt;&lt;PRE&gt;authentication.ldap.managerDn=CN=&amp;lt;manager DN&amp;gt;,OU=ApplAccounts,OU=Applications,DC=xxx,DC=com&lt;/PRE&gt;</description>
      <pubDate>Tue, 03 Nov 2015 09:20:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96400#M9879</guid>
      <dc:creator>nsabharwal</dc:creator>
      <dc:date>2015-11-03T09:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96401#M9880</link>
      <description>&lt;P&gt;Hi Neeraj,&lt;/P&gt;&lt;P&gt;Manager DN has read access, that's how I can sync users and groups. But actual login user (for example: &lt;STRONG&gt;cmmuriat&lt;/STRONG&gt; ) does't have read permissions on own user object attributes. Find below code, it is trying to get user attributes using logged-in bind DN not by using manager DN.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;BindAuthenticator.java&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;
&lt;/STRONG&gt;&lt;/P&gt;private DirContextOperations bindWithDn(String userDnStr, String username,			String password) {		BaseLdapPathContextSource ctxSource = (BaseLdapPathContextSource) getContextSource();		DistinguishedName userDn = new DistinguishedName(userDnStr);		DistinguishedName fullDn = new DistinguishedName(userDn);		fullDn.prepend(ctxSource.getBaseLdapPath());&lt;STRONG&gt;		logger.debug("Attempting to bind as " + fullDn);&lt;/STRONG&gt;		DirContext ctx = null;		try {			ctx = getContextSource().getContext(fullDn.toString(), password);			// Check for password policy control			PasswordPolicyControl ppolicy = PasswordPolicyControlExtractor					.extractControl(ctx);&lt;STRONG&gt;			logger.debug("Retrieving attributes...");&lt;/STRONG&gt;&lt;STRONG&gt;			Attributes attrs = ctx.getAttributes(userDn, getUserAttributes());&lt;/STRONG&gt;			DirContextAdapter result = new DirContextAdapter(attrs, userDn,					ctxSource.getBaseLdapPath());			if (ppolicy != null) {				result.setAttributeValue(ppolicy.getID(), ppolicy);			return result;		catch (NamingException e) {			// This will be thrown if an invalid user name is used and the method may			// be called multiple times to try different names, so we trap the exception			// unless a subclass wishes to implement more specialized behaviour.			if ((e instanceof org.springframework.ldap.AuthenticationException)					|| (e instanceof org.springframework.ldap.OperationNotSupportedException)) {				handleBindException(userDnStr, username, e);			else {				throw e;		catch (javax.naming.NamingException e) {			throw LdapUtils.convertLdapException(e);		finally {			LdapUtils.closeContext(ctx);		return null;</description>
      <pubDate>Tue, 03 Nov 2015 10:10:58 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96401#M9880</guid>
      <dc:creator>rtummuri</dc:creator>
      <dc:date>2015-11-03T10:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96402#M9881</link>
      <description>&lt;P&gt;&lt;A href="http://stackoverflow.com/questions/2831630/why-does-spring-securitys-bindauthenticator-require-read-permissions-for-users" target="_blank"&gt;http://stackoverflow.com/questions/2831630/why-does-spring-securitys-bindauthenticator-require-read-permissions-for-users&lt;/A&gt;&lt;/P&gt;&lt;P&gt;this is the same issue I am having. I can customize if it is out side of Ambari. But not sure customizing in ambari.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 21:37:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96402#M9881</guid>
      <dc:creator>rtummuri</dc:creator>
      <dc:date>2015-11-03T21:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96403#M9882</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/32/paul.html" nodeid="32"&gt;@Paul Codding&lt;/A&gt; ideas? Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 22:28:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96403#M9882</guid>
      <dc:creator>nsabharwal</dc:creator>
      <dc:date>2015-11-03T22:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96404#M9883</link>
      <description>&lt;P&gt;So this is for AD Lightweight Directory Services and the customer cannot allow users read access to their own attributes?  If this is the case, and they won't budge on making the permissions change, this would require a product change.  That takes time...&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2015 01:12:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96404#M9883</guid>
      <dc:creator>pcodding</dc:creator>
      <dc:date>2015-11-04T01:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96405#M9884</link>
      <description>&lt;P&gt;&lt;A href="http://community.hortonworks.com/users/32/paul.html"&gt;@Paul Codding&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thanks Paul. Yes. AD LDS team confirmed that modifying the configuration on the AD LDS directory is not an option. They are recommending "modify the code &lt;STRONG&gt;&lt;U&gt;(do a &lt;/U&gt;&lt;/STRONG&gt;&lt;U&gt;&lt;STRONG&gt;BIND as the manager DN account to read attributes of the user right after the successful bind as the user&lt;/STRONG&gt;&lt;/U&gt;&lt;STRONG&gt;&lt;U&gt;)&lt;/U&gt;&lt;/STRONG&gt;.".  Do Ambari actually required any user attributes? if not, I can try to rebuild spring security jar by commenting "&lt;STRONG&gt;Attributes attrs = ctx.getAttributes(userDn, getUserAttributes());" in &lt;/STRONG&gt;&lt;STRONG&gt;BindAuthenticator.java.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks Again.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2015 02:53:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96405#M9884</guid>
      <dc:creator>rtummuri</dc:creator>
      <dc:date>2015-11-04T02:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Ambari – AD LDS (LDAP) integration</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96406#M9885</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/375/oszabo.html" nodeid="375"&gt;@oszabo@hortonworks.com&lt;/A&gt; is in the process of troubleshooting some other LDAP related items at the moment and may be able to comment, but I will get an internal JIRA filed for this and we'll have to get it slated.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2015 06:42:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ambari-AD-LDS-LDAP-integration/m-p/96406#M9885</guid>
      <dc:creator>pcodding</dc:creator>
      <dc:date>2015-11-04T06:42:38Z</dc:date>
    </item>
  </channel>
</rss>

