====== Authenticationn against Active Directory ====== If you want to provide an application (e.g. laboratory wiki), which you wish to access using university accounts - and therefore save yourself the maintenance of a own account and password database - you can offer that using LDAP or Kerberos. {{INLINETOC}} ===== Authentication using LDAP ===== For this the following parameters have to be provided (depending on your application some parameters may be optional). "abc12345" needs to be replaced with your account name: | URL | ''[[ldaps://adldap.hs-regensburg.de/]]'' | | Server | ''adldap.hs-regensburg.de'' | | Port | ''636'' | | Base DN | ''dc=hs-regensburg,dc=de'' | | Bind DN | ''abc12345@hs-regensburg.de'' | | Search filter | ''samAccountName=abc12345'' | == Troubleshooting == For test purposes you can enter the ''ldapsearch'' command on a Linux machine: ldapsearch -H 'ldaps://adldap.hs-regensburg.de' -b 'DC=hs-regensburg,DC=de' -D 'abc12345@hs-regensburg.de' -W -z 0 -LLL -E pr=1000/noprompt samAccountName=abc12345 Depending on your system you need to enter the following into your ''/etc/openldap/ldap.conf'': TLS_REQCERT allow sasl_secprops maxssf=0 Note: The line "sasl_secprops maxssf=0" has caused the following error on Ubuntu 20.04 when performing a domain join with realmd/sssd (realm join HS-REGENSBURG.DE -U ): adcl: couldn't connect to hs-regensburg.de domain: Couldn't authenticate to active directory: SASL(-7): invalid parameter supplied: Unable to find a callback: 32775 ! Insufficient permissions to join the domain Without abovementioned parameter a join was possible. ===== Authentication using Kerberos ===== In case your application does with the help of "mit-krb5" respectively "heimdal" support Kerberos (e.g. various Tomcat-applications), you need to provide the following in your ''/etc/krb5.conf'': [libdefaults] default_realm = HS-REGENSBURG.DE clockskew = 300 ticket_lifetime = 36000