Aura.Auth icon indicating copy to clipboard operation
Aura.Auth copied to clipboard

Add ldap bind user

Open t0xicCode opened this issue 11 years ago • 13 comments

It is considered good practice to have ldap authentication libraries first bind using a service account, then run a search for the user and finally try to bind (and thus authenticate) using the provided credentials.

As an added bonus, that would enable supports for multi-level user trees, which the current implementation does not support.

t0xicCode avatar Sep 06 '14 20:09 t0xicCode

I am all for that. If you have examples in code, or a PR, I'd be happy to a review.

pmjones avatar Sep 06 '14 21:09 pmjones

Unfortunately I do not have any example readily available. I do know that the Drupal ldap module supports this use case.

t0xicCode avatar Sep 06 '14 21:09 t0xicCode

Link to the Drupal LDAP module? Every little bit you help out helps this go faster. :-)

pmjones avatar Sep 06 '14 21:09 pmjones

I'm on mobile right now, but I'll add some details as soon as I get to a computer :smiley:

t0xicCode avatar Sep 06 '14 22:09 t0xicCode

@t0xicCode is it simple ldap or ldap ?

http://cgit.drupalcode.org/simple_ldap/tree/?h=7.x-2.x http://cgit.drupalcode.org/ldap/tree/?h=8.x-2.x

May be good if you can point to the right file though.

Thanks

harikt avatar Sep 07 '14 01:09 harikt

@harikt ldap. It's located in the function at http://cgit.drupalcode.org/ldap/tree/ldap_authentication/ldap_authentication.inc#n532.

Line 562 does the initial bind with the service account credentials, it then maps or searches for the given username, and finally, at line 659 actually authenticates with the given password and the mapped ldap user.

The bind function that is called at multiple places uses the stored service account information if it's passed NULL for its parameters.

t0xicCode avatar Sep 07 '14 16:09 t0xicCode

Thank you @t0xicCode

harikt avatar Sep 07 '14 16:09 harikt

There's also some trickiness here that some LDAP servers require you to set options for the bind to even work right:

ldap_set_option($ldap, LDAP_OPT_REFERRALS, 0);
ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, 3);

I'm not sure this breaks it for other connection types, but I had to use this for a MS-based domain handler.

Also, I noticed in the VerifierInterface, it requires the second parameter (the hashed value). In this case, it doesn't make sense to have to generate something for that as the plain-text password is just sent to the LDAP server for validation.

enygma avatar Oct 15 '14 13:10 enygma

Also, I noticed in the VerifierInterface, it requires the second parameter (the hashed value). In this case, it doesn't make sense to have to generate something for that as the plain-text password is just sent to the LDAP server for validation.

Hm, in that case the verifier don't need to do the verification . And even though there need a PlainText verifier.

harikt avatar Oct 15 '14 13:10 harikt

Sorry forgot to add . Which always returns true.

<?php
namespace Aura\Auth\Verifier;

class PlainTextVerifier implements VerifierInterface
{
    public function verify($plaintext, $hashvalue, array $extra = array())
    {
        return $plaintext === $hashvalue;
    }
}

harikt avatar Oct 15 '14 13:10 harikt

So you're saying not having a verifier for LDAP at all? Based on the others it kind of seems like that's the point (to abstract that out behind the generic verify method).

enygma avatar Oct 15 '14 13:10 enygma

@enygma I was looking at http://php.net/manual/en/function.ldap-compare.php and it seems to me we need to do something like as shown in example. The above example I mentioned checking plain and hash one is wrong.

harikt avatar Oct 15 '14 14:10 harikt

Yeah, the tricky part on that is whether or not the password is returned and how to set up that base DN information. Also, the compare will only work if there's a service account as was mentioned in the initial comment here. If you're using the ldap_bind method for testing the login, you wouldn't even be able to run the compare if the login was incorrect.

enygma avatar Oct 15 '14 14:10 enygma