Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

No search after succesful bind. #54

Open
mrnours opened this issue Jun 7, 2024 · 2 comments
Open

No search after succesful bind. #54

mrnours opened this issue Jun 7, 2024 · 2 comments
Assignees
Labels
bug Something isn't working

Comments

@mrnours
Copy link

mrnours commented Jun 7, 2024

Hello,

I'm just trying to get the plugin to work on the last taiga version.
I had followed the guide to install it without docker.

The problem is that the server keeps saying that my password is incorrect with a valid ldap account.
But on the ldap server side i see that the authentification is succesful but there is no search operation afterward.

Any clues?

I had a taiga 5 server with an old version of this plugin that is working with the same ldap server...

Thanks for your help.

@mrnours mrnours added the bug Something isn't working label Jun 7, 2024
@dsalgueiror
Copy link

From what I have been able to test and the same thing happens to me in our installation migrated from Taiga 5 to 6 latest version, the authentication works well for Taiga but in the login process it updates or modifies the password value of the users table and this prevents the access to the Django admin because the encryption is different, expecting to have data of type pbkdf2_sha256$xxxxxxxxx. In the case of using the option to recover password and indicating it manually, the data saved in the DB is correct but once I log in again in Taiga it is modified.

I'm using the taiga-contrib-ldap-auth-ext plugin and it supposedly has an option to disable this behavior via LDAP_SAVE_LOGIN_PASSWORD = False, but it doesn't work. In addition to this being the case, I understand that the Django admin would not be using LDAP validation if not the one stored at that moment in the DB.

Greetings!!

@dsalgueiror
Copy link

Well, last discard test, I have finally commented #LDAP_SAVE_LOGIN_PASSWORD = False and working!!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

3 participants