-
-
Notifications
You must be signed in to change notification settings - Fork 144
AD LDAP authentication failure #1015
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi SergeyTrue! 👋 Welcome, and thank you for opening your first issue in the repo! Please wait for triaging by our maintainers. As development is carried out in our spare time, you can support us by sponsoring our activities or even funding the development of specific issues. If you plan to raise a PR for this issue, please take a look at our contributing guide. |
Addidilal info:
The last line of the logs is the error I get whenever I try to login. The error messages before are not direclty related to the login event, but maybe they can help to find out what's going wrong. |
Hi, we have the following resources related to LDAP/AD:
The issue most likely is with your config, usually, it's about filters. Try adding the following config properties:
Restart, re-authenticate, check logs, especially for |
Further user feedback is requested. Please reply within 7 days or we might close the issue. |
Hi @Haarolean |
Thanks for the additional feedback! We'll get back to your issue soon. |
I have managed to increase logging level by doing this:
For some reason I don't see SpringSecurityLdapTemplate in the logs. But I found the follwoing: it looks like that system adds @@null to the username instead of domain.
Might this @@null be the reason for Full trace:
|
Try replacing your stuff with
note last line difference with your config |
I tried the following:
Nothing changes, I still get DoeJ@@null in the logs. Logs look exactly the same way as above.
Logs look different now:
However we have Active Directroy. Maybe the error is caused trying to into Active Directory with |
My bad. Corrected to SPRING_CONFIG_ADDITIONAL-LOCATION, and now LDAP-authentication works. |
Uh oh!
There was an error while loading. Please reload this page.
Issue submitter TODO list
main
-labeled docker image and the issue still persists thereDescribe the bug (actual behavior)
I have configured kafka-ui to authenticate via LDAP. I get error
o.s.s.l.a.a.ActiveDirectoryLdapAuthenticationProvider: Active Directory authentication failed: Supplied password was invalid
whenever i try to login. I'm sure I've ented correct credentials (both in UI the ldap config). I tried credentials of different users, but result is the same.
Expected behavior
I would expect that I would be able to login using my AD password.
Your installation details
/etc/kafkaui/roles.yml
ldapsearch output, for the role i'm trying to authenticate both in IU and specified in the config:
Steps to reproduce
Kafka is runnigng in docker swarm:
docker stack deploy -c docker-compose.yml kafka_cluster
Screenshots
No response
Logs
Here are the logs from kafka-ui service.
Additional context
No response
The text was updated successfully, but these errors were encountered: