You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ambari.apache.org by "Robert Levas (JIRA)" <ji...@apache.org> on 2015/05/24 14:56:17 UTC
[jira] [Updated] (AMBARI-11362) Kerberos: Creating principals in AD
when special characters are involved causes failures
[ https://issues.apache.org/jira/browse/AMBARI-11362?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Robert Levas updated AMBARI-11362:
----------------------------------
Summary: Kerberos: Creating principals in AD when special characters are involved causes failures (was: Creating principals in AD when special characters are involved causes failures)
> Kerberos: Creating principals in AD when special characters are involved causes failures
> ----------------------------------------------------------------------------------------
>
> Key: AMBARI-11362
> URL: https://issues.apache.org/jira/browse/AMBARI-11362
> Project: Ambari
> Issue Type: Bug
> Components: ambari-server
> Affects Versions: 2.0.0
> Reporter: Robert Levas
> Assignee: Robert Levas
> Priority: Critical
> Labels: active-directory, active_directory, kerberos
> Fix For: 2.1.0
>
>
> Creating principals in AD when special characters are involved causes failures.
> The following characters in the CN need to be escaped:
> {noformat}
> / , \ # + < > ; " =
> {noformat}
> *Note:* javax.naming.ldap.Rdn will properly escape relative distinguished name parts.
> The following characters in the sAMAccountName need to be removed or replaced:
> {noformat}
> [ ] : ; | = + * ? < > / \
> {noformat}
> *Note:* This needs to be done explicitly within the attributes set if a relevant entry exists.
> {code}
> // Replace the following _illegal_ characters: [ ] : ; | = + * ? < > / \
> value = value.toString().replaceAll("\\[|\\]|\\:|\\;|\\||\\=|\\+|\\*|\\?|\\<|\\>|\\/|\\\\", "_");
> {code}
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)