RE: [us...@httpd] Multiple authentication sources (OUs) - AuthnProviderAlias

2009-10-27 Thread Emmanuel Bailleul
>> >> This doesn't seem to work.  I know your thinking - "why not just use >> groups"?  Ans: Simply because we don't want to have to maintain groups for >> our many clients.  We would like to rely on the client user's presence in >> the OU (and allow our service accounts and support personnel at th

Re: [us...@httpd] Multiple authentication sources (OUs) - AuthnProviderAlias

2009-10-26 Thread Eric Covener
On Mon, Oct 26, 2009 at 5:43 PM, Brian Banaszynski wrote: > > This doesn’t seem to work.  I know your thinking – “why not just use > groups”?  Ans: Simply because we don’t want to have to maintain groups for > our many clients.  We would like to rely on the client user’s presence in > the OU (and

[us...@httpd] Multiple authentication sources (OUs) - AuthnProviderAlias

2009-10-26 Thread Brian Banaszynski
We are trying to allow Apache to authenticate users to a certain site based on being in one of 3 OU designations in AD. 3. A specific client OU (Client ABC in our example) 1. Service Accounts 2. Internal Support We have set up 3 "AuthnProviderAlias" directives. Notably, all the alias definitio

[us...@httpd] Re: Multiple authentication sources

2009-01-19 Thread Craig McQueen
I tried AuthLDAPRemoteUserIsDN. I can login by just entering a username. It set REMOTE_USER to the full distinguished name, LDAP style: CN=Craig McQueen,OU=Users,OU=MyDepartment,OU=All,DC=mycompany,DC=com,DC=au That does enable the back-end to distinguish which domain the authentication is on.

Re: Multiple authentication sources

2008-12-11 Thread Morgan Gangwere
Simple fix: have a job on the server that comes by and takes all the auth data from one source and consolidates it into its own, then goes to the next, rinse repeat. Shoudlnt be hard... -- Morgan Gangwere Unknown Software http://sonof.bandit.name/ Member, INCOSE [ incose.org ] PACA [ paca.org

Re: Multiple authentication sources

2008-12-11 Thread Krist van Besien
On Thu, Dec 11, 2008 at 9:12 AM, Craig McQueen <[EMAIL PROTECTED]> wrote: > It's a global company and we now want to allow remote branches to access the > server. That means we want to extend authentication somehow. I had the same issues, also with an apache subversion server. In the end I settl

Re: Multiple authentication sources

2008-12-11 Thread André Warnier
Hi. Craig McQueen wrote: [...] I believe (only believe, not certain), that the Windows Domain method would work if your local domain and the global domain were in a "trust relationship" (Windows Domain term) with eachother. That is, the DC that you use for SSPI authentication acepts the id's

Re: Multiple authentication sources

2008-12-11 Thread Craig McQueen
Thanks for your reply. Your question prompted me to check the docs again, and I see there is the AuthLDAPRemoteUserIsDN option. I hadn't realised that possibility before. I'll try it. Requiring our users to enter their username in FQD isn't going to work. But if AuthLDAPRemoteUserIsDN works in

Re: Multiple authentication sources

2008-12-11 Thread Michele Mase'
Does the option 3 work changing the username from the form domain\username into [EMAIL PROTECTED] (domain in fqd form i.e. example.com)? Regards Michele On Thu, Dec 11, 2008 at 9:12 AM, Craig McQueen <[EMAIL PROTECTED]>wrote: > My company (in Australia) has a working Apache server on its Intrane

Multiple authentication sources

2008-12-11 Thread Craig McQueen
My company (in Australia) has a working Apache server on its Intranet -- incidentally, for serving Subversion. It's on Windows 2003 and it's set up for authentication using the SSPI module. Currently Apache 2.0 but I want to upgrade to 2.2 to support the latest Subversion. We are also using a Subve