You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@druid.apache.org by GitBox <gi...@apache.org> on 2020/02/05 20:13:43 UTC
[GitHub] [druid] averma111 commented on issue #9303: ERROR
[qtp1604271704-130]
org.apache.druid.security.basic.authentication.validator.LDAPCredentialsValidator
- Exception during user lookup
averma111 commented on issue #9303: ERROR [qtp1604271704-130] org.apache.druid.security.basic.authentication.validator.LDAPCredentialsValidator - Exception during user lookup
URL: https://github.com/apache/druid/issues/9303#issuecomment-582591052
Thank you @mohammadjkhan please find the below details for TSL and LDAP both
#TLS
druid.enablePlaintextPort=false
druid.enableTlsPort=true
druid.server.https.keyStorePath=**.jks
druid.server.https.keyStoreType=JKS
druid.server.https.certAlias=<domain name>
druid.server.https.keyStorePassword=<password>
druid.server.https.requireClientCertificate=false
druid.server.https.requestClientCertificate=false
druid.client.https.trustStorePath=*.jks
druid.client.https.trustStoreType=JKS
druid.client.https.trustStorePassword=<password>
druid.auth.authenticatorChain=["ldap"]
druid.auth.authenticator.ldap.type=basic
druid.auth.authenticator.ldap.enableCacheNotifications=true
druid.auth.authenticator.ldap.credentialsValidator.type=ldap
druid.auth.authenticator.ldap.credentialsValidator.url=<ldap server>:<port>
druid.auth.authenticator.ldap.credentialsValidator.bindUser=<userid>
druid.auth.authenticator.ldap.credentialsValidator.bindPassword=<password>
druid.auth.authenticator.ldap.credentialsValidator.baseDn=<dn name>
druid.auth.authenticator.ldap.credentialsValidator.userSearch=<search criteria>
druid.auth.authenticator.ldap.credentialsValidator.userAttribute=sAMAccountName
druid.auth.authenticator.ldap.authorizerName=ldapauth
druid.escalator.type=basic
druid.escalator.internalClientUsername=druid_system
druid.escalator.internalClientPassword=password2
druid.escalator.authorizerName=ldapauth
druid.auth.authorizers=["ldapauth"]
druid.auth.authorizer.ldapauth.type=basic
druid.auth.authorizer.ldapauth.initialAdminUser=admin
druid.auth.authorizer.ldapauth.initialAdminRole=admin
druid.auth.authorizer.ldapauth.roleProvider.type=ldap
Let me know if these setting looks good
----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:
users@infra.apache.org
With regards,
Apache Git Services
---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org