privacyidea-ldap-proxy icon indicating copy to clipboard operation
privacyidea-ldap-proxy copied to clipboard

:evergreen_tree: LDAP Proxy to intercept LDAP binds and authenticate against privacyIDEA

Results 21 privacyidea-ldap-proxy issues
Sort by recently updated
recently updated
newest added

Right now, we use the service account specified in ``[service-account]`` for two purposes: * If ``bind-service-account`` is set to ``true``, a bind request that was authenticated successfully against privacyIDEA will...

prio:high

#13 implements mapping of applications to realms by monitoring the LDAP traffic for so-called *preambles*: A preamble is the LDAP search request performed by applications prior to a LDAP bind....

prio:low

Implement last_bind and first_bind. This is to cope with the "re_binds" of an application like owncloud. last_bind Specify how long the last bind may be over. If last_bind is over,...

prio:low

We assume an application that uses a service account to lookup the DN from a login name. Then, the login flow results in several LDAP connections established by the LDAP...

prio:low

In ``config.ini`` setting in section ``[ldap-backend]`` the ``host = "ldap://1.2.3.4"``. twisted runs into this error: 2017-02-12T08:39:37+0100 [pi_ldapproxy.proxy.ProxyServerFactory] Unhandled Error Traceback (most recent call last): File "/home/cornelius/src/privacyidea-ldap-proxy/venv/local/lib/python2.7/site-packages/twisted/python/log.py", line 86, in callWithContext...

prio:medium

We can reproduce this using locust: * Use `lookup` mapping strategy on the LDAP proxy * Edit `locustfile.py` and set `USER_DN` to a DN that does not exist in the...

prio:high

Right now, incoming LDAP bind and search requests are handled, whereas all other incoming requests are rejected (by sending a ``LDAPInsufficientAccessRights`` response). In particular, incoming LDAP unbind requests are rejected,...

prio:medium

We have a config option ``allow-search`` in the ``[ldap-proxy]`` section which enables forwarding of incoming search requests to the LDAP backend. However, it would probably be nice to differentiate between...

prio:low

As described [in the Twisted docs](http://twistedmatrix.com/documents/current/core/howto/systemd.html#socket-activation), socket activation has the advantage that we do not have to start Twisted as a privileged user to bind to low ports. However, the...

prio:low

[This docstring](https://github.com/twisted/ldaptor/blob/ed5d140/ldaptor/protocols/ldap/ldapclient.py#L224) seems to suggest that the ldaptor client library does not validate the hostname of the server for STARTTLS connections. If this is the case, we should add a...

prio:medium