You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@druid.apache.org by GitBox <gi...@apache.org> on 2020/02/05 20:13:43 UTC

[GitHub] [druid] averma111 commented on issue #9303: ERROR [qtp1604271704-130] org.apache.druid.security.basic.authentication.validator.LDAPCredentialsValidator - Exception during user lookup

averma111 commented on issue #9303: ERROR [qtp1604271704-130] org.apache.druid.security.basic.authentication.validator.LDAPCredentialsValidator - Exception during user lookup
URL: https://github.com/apache/druid/issues/9303#issuecomment-582591052
 
 
   Thank you @mohammadjkhan  please find the below details for TSL and LDAP both
   
   #TLS
   druid.enablePlaintextPort=false
   druid.enableTlsPort=true
   druid.server.https.keyStorePath=**.jks
   druid.server.https.keyStoreType=JKS
   druid.server.https.certAlias=<domain name>
   druid.server.https.keyStorePassword=<password>
   druid.server.https.requireClientCertificate=false
   druid.server.https.requestClientCertificate=false
   druid.client.https.trustStorePath=*.jks
   druid.client.https.trustStoreType=JKS
   druid.client.https.trustStorePassword=<password>
   
   druid.auth.authenticatorChain=["ldap"]
   druid.auth.authenticator.ldap.type=basic
   druid.auth.authenticator.ldap.enableCacheNotifications=true
   druid.auth.authenticator.ldap.credentialsValidator.type=ldap
   druid.auth.authenticator.ldap.credentialsValidator.url=<ldap server>:<port>
   druid.auth.authenticator.ldap.credentialsValidator.bindUser=<userid>
   druid.auth.authenticator.ldap.credentialsValidator.bindPassword=<password>
   druid.auth.authenticator.ldap.credentialsValidator.baseDn=<dn name>
   druid.auth.authenticator.ldap.credentialsValidator.userSearch=<search criteria>
   druid.auth.authenticator.ldap.credentialsValidator.userAttribute=sAMAccountName
   druid.auth.authenticator.ldap.authorizerName=ldapauth
   druid.escalator.type=basic
   druid.escalator.internalClientUsername=druid_system
   druid.escalator.internalClientPassword=password2
   druid.escalator.authorizerName=ldapauth
   druid.auth.authorizers=["ldapauth"]
   druid.auth.authorizer.ldapauth.type=basic
   druid.auth.authorizer.ldapauth.initialAdminUser=admin
   druid.auth.authorizer.ldapauth.initialAdminRole=admin
   druid.auth.authorizer.ldapauth.roleProvider.type=ldap
   
   Let me know if these setting looks good

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org