- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 80 for ldap (0.03 sec)
-
docs/sts/ldap.md
Many Active Directory and other LDAP services are setup with [DNS SRV Records](https://ldap.com/dns-srv-records-for-ldap/) for high-availability of the directory service. To use this to find LDAP servers to connect to, an LDAP client makes a DNS SRV record request to the DNS service on a domain that looks like `_service._proto.example.com`. For LDAP the `proto` value is always `tcp`, and `service` is usually `ldap` or `ldaps`.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.9K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
return } // In case of LDAP/OIDC we need to set `opts.claims` to ensure // it is associated with the LDAP/OIDC user properly. for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else { // We still need to ensure that the target user is a valid LDAP user. //
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/exception/LdapOperationExceptionTest.java
Exception innerCause = new IllegalArgumentException("Invalid LDAP parameter"); RuntimeException middleCause = new RuntimeException("LDAP configuration error", innerCause); LdapOperationException exception = new LdapOperationException("LDAP operation failed", middleCause); assertEquals("LDAP operation failed", exception.getMessage()); assertEquals(middleCause, exception.getCause());
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 8.1K bytes - Viewed (0) -
.github/workflows/iam-integrations.yaml
if: matrix.ldap == 'ldaphost:389' env: _MINIO_LDAP_TEST_SERVER: ${{ matrix.ldap }} run: | make test-iam-ldap-upgrade-import - name: Test LDAP for automatic site replication if: matrix.ldap == 'localhost:389' run: | make test-site-replication-ldap - name: Test OIDC for automatic site replication
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 5.3K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/ldap/LdapManager.java
fessConfig.getLdapAdminSecurityCredentials()); } /** * Updates the LDAP configuration. */ public void updateConfig() { isBind = false; } /** * Validates the LDAP connection. * * @return True if the LDAP connection is valid, otherwise false. */ protected boolean validate() { if (!isBind) {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 82K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/web/admin/general/EditForm.java
public Integer purgeSuggestSearchLogDay; /** * LDAP server URL for authentication. * Used when LDAP authentication is enabled. */ @Size(max = 1000) public String ldapProviderUrl; /** * LDAP security principal for binding to the LDAP server. * Used for authenticating with the LDAP server. */ @Size(max = 1000) public String ldapSecurityPrincipal;
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 9.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/ldap/LdapUser.java
import org.codelibs.fess.util.ComponentUtil; import org.dbflute.optional.OptionalThing; /** * An LDAP user. */ public class LdapUser implements FessUser { private static final long serialVersionUID = 1L; /** The environment for LDAP connection. */ protected Hashtable<String, String> env; /** The name of the user. */ protected String name;
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 4.1K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/exception/LdapConfigurationExceptionTest.java
String message = "LDAP error: \"Invalid <config>\" & 'bad chars' @ #$%^&*()"; LdapConfigurationException exception = new LdapConfigurationException(message); assertEquals(message, exception.getMessage()); } public void test_unicodeCharactersInMessage() { // Test with Unicode characters in message String message = "LDAP設定エラー: 接続失敗 🚫 ñ é ü ß";
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 7.5K bytes - Viewed (0) -
src/main/resources/fess_config.properties
ldap.role.search.role.enabled=true # LDAP attribute for surname. ldap.attr.surname=sn # LDAP attribute for given name. ldap.attr.givenName=givenName # LDAP attribute for employee number. ldap.attr.employeeNumber=employeeNumber # LDAP attribute for mail. ldap.attr.mail=mail # LDAP attribute for telephone number. ldap.attr.telephoneNumber=telephoneNumber
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Jul 05 14:45:37 UTC 2025 - 54.7K bytes - Viewed (0) -
cmd/iam.go
// 1. Collect all LDAP users with active creds. allCreds := sys.store.GetSTSAndServiceAccounts() // List of unique LDAP (parent) user DNs that have active creds var parentUserActualDNList []string // Map of LDAP user (internal representation) to list of active credential objects parentUserToCredsMap := make(map[string][]auth.Credentials) // DN to ldap username mapping for each LDAP user
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0)