Allow unauthenticated LDAP connections in the LDAP backend

Bug #1119495 reported by Ionuț Arțăriși
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
OpenStack Identity (keystone)
Fix Released
Undecided
Ionuț Arțăriși

Bug Description

Currently a bind operation is tried when first getting a connection to an LDAP server even when the user and password fields are blank. There are cases where LDAP servers allow unauthenticated users to access the data store, but require authentication only for some actions. Thus, keystone should not try a bind operation in case the user or password are not given.

Changed in keystone:
assignee: nobody → Ionuț Arțăriși (mapleoin)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to keystone (master)

Fix proposed to branch: master
Review: https://review.openstack.org/21519

Changed in keystone:
status: New → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to keystone (master)

Reviewed: https://review.openstack.org/21519
Committed: http://github.com/openstack/keystone/commit/cfb3fdb5ecd3969e069a5379a0de34839af6e626
Submitter: Jenkins
Branch: master

commit cfb3fdb5ecd3969e069a5379a0de34839af6e626
Author: Ionuț Arțăriși <email address hidden>
Date: Fri Feb 8 17:35:19 2013 +0100

    allow unauthenticated connections to an LDAP server

    Fixes: bug 1119495

    Change-Id: I13cdc212752f212ecf59a6a83f8f32c042ccf6e0

Changed in keystone:
status: In Progress → Fix Committed
Thierry Carrez (ttx)
Changed in keystone:
milestone: none → grizzly-3
status: Fix Committed → Fix Released
Thierry Carrez (ttx)
Changed in keystone:
milestone: grizzly-3 → 2013.1
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.