##// END OF EJS Templates
auth: don't break hashing in case of user with empty password....
auth: don't break hashing in case of user with empty password. In some cases such as LDAP user created via external scripts users might set the passwords to empty. The hashing uses the md5(password_hash) to store reference to detect password changes and forbid using the same password. In case of pure LDAP users this is not valid, and we shouldn't raise Errors in such case. This change makes it work for empty passwords now.

File last commit:

r1560:ee329948 default
r2203:8a18c3c3 default
Show More
ldap-active-directory.rst
28 lines | 926 B | text/x-rst | RstLexer
/ docs / auth / ldap-active-directory.rst

Active Directory

|RCM| can use Microsoft Active Directory for user authentication. This is done through an LDAP or LDAPS connection to Active Directory. Use the following example LDAP configuration setting to set your Active Directory authentication.

# Set the Base DN
Base DN              = OU=SBSUsers,OU=Users,OU=MyBusiness,DC=v3sys,DC=local
# Set the Active Directory SAM-Account-Name
Login Attribute      = sAMAccountName
# Set the Active Directory user name
First Name Attribute = usernameame
# Set the Active Directory user surname
Last Name Attribute  = user_surname
# Set the Active Directory user email
E-mail Attribute     = userEmail

Below is example setup that can be used with Active Directory and ldap groups.

LDAP/AD setup example