https://bz.apache.org/bugzilla/show_bug.cgi?id=61977

--- Comment #9 from marian.romasc...@nuance.com ---
A bit too quick in crying victory. Here is the scenario:
- using CombinedRealm with 2 JNDIREalm 
  * 1 on testdomain1.example.org
  * 1 on testdomain2.example.org
- using the ldap:///<domain> construct for the connectionURL in each JNDIREalm
- having different userBase and roleBase in each of the JNDIREalm, like below
  userBase="OU=ouUserBase1,DC=testdomain1,DC=example,DC=org" 
  roleBase="OU=ouRoleBase1,DC=testdomain1,DC=example,DC=org" 
  userBase="OU=ouUserBase2,DC=testdomain2,DC=example,DC=org" 
  roleBase="OU=ouRoleBase2,DC=testdomain2,DC=example,DC=org" 
- using a Kerberos SSO config (securityConstraints based on the
userBase/roleBase above)

Here are the issues observed so far:
1) with the patch the userBase and roleBase above result in LDAP searches with
the domain part in double e.g :
"OU=ouUserBase1,DC=testdomain1,DC=example,DC=org,DC=testdomain1,DC=example,DC=org"
I had to remove the domain parts to move on and make it partially working (see
issue #2)
  userBase="OU=ouUserBase1" 
  roleBase="OU=ouRoleBase1" 
  userBase="OU=ouUserBase2" 
  roleBase="OU=ouRoleBase2" 

2) With the above "hack" the first TGS-REQ trying to get an LDAP SPN will be OK
w/o a trailing dot in the sname. However 2'nd TGS-REQ (for the other
sub-domain) will come with the trailing dot. Does not matter the order - the
1'st can be for testdomain1 or testdomain2, it will work. The 2'nd SSO attempt
for the other subdomain, as visible in the Wireshark trace, will produce a
TCS-REQ with a ldap SPN sname with a trailing dot

Thanks in advance for looking at what might cause the 2 issues above.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to