fb1985a97912b25ec6564c73e610a31e5fc6e25f 1637990 |
|
10-Nov-2014 |
covener |
Resolve rashes with LDAP authz and non-LDAP authn since r1608202. |
d0665ced0949a4ec701f2805ae16e89dc23622f2 1611980 |
|
20-Jul-2014 |
jailletc36 |
Add missing APLOGNO.
Split lines longer than 80. |
63b9f1f5880391261705f696d7d65507bbe9ace3 1608202 |
|
06-Jul-2014 |
covener |
Consolidate common code that got duplicated by 2.3.x authz refactoring.
Arrange for backend LDAP connections to be returned
to the pool by a fixup hook rather than staying locked
until the end of (a potentially slow) request.
Add a little more trace4 to the authnz_ldap side of LDAP connection obtain/release. |
9ee814f862f6f2203cf0d1859969682954dfa97a 1596108 |
|
20-May-2014 |
jailletc36 |
Fix duplicate APLOGNO |
b54b024c06a19926832d77d40ba35ad8c41e4d3d 1591012 |
|
29-Apr-2014 |
minfrin |
mod_authnz_ldap: Fail explicitly when the filter is too long. Remove
unnecessary apr_pstrdup() and strlen(). |
65967d05f839dbf27cf91d91fa79585eeae19660 1589993 |
|
25-Apr-2014 |
minfrin |
Add the ldap-search option to mod_authnz_ldap, allowing authorization
to be based on arbitrary expressions that do not include the username. |
f6098228fada9d4d6dcdc0cd321f4f5904040d1e 1558483 |
|
15-Jan-2014 |
trawick |
follow-up to r1554161, r1554168, r1554170, r1554175, r1554188, and r1554195:
axe unnecessary initialization/pool allocation |
5723fe6ad5f24ac85d97259f524a7c3e43a45c6d 1554161 |
|
30-Dec-2013 |
minfrin |
mod_authnz_ldap: Support the expression parser within the require
directives. |
8d78ce224707f0608244b25b9d5c6807eea1da8d 1553485 |
|
26-Dec-2013 |
covener |
update comments for two r->user related directives. |
54c9a3aec02f10b5c4b8ed25548215af1d9043d7 1551611 |
|
17-Dec-2013 |
covener |
Log a warning when the LDAP authn provider is configured but an AuthLDAPURL
isn't -- IOW, avoid silently skipping a misconfigured [or buggy?] LDAP provider. |
58c74a790988c0c63b08d15f9af6908b36f3efd8 1546860 |
|
01-Dec-2013 |
jailletc36 |
Fix missing spaces in messages |
9b0076ddd1103e5fa9c1f9bafde4b06ce244fbae 1525866 |
|
24-Sep-2013 |
covener |
Change the default value of AuthLDAPMaxSubGroupDepth, so sub-group searching
is opt-in. Not intended for 2.4 backport. |
a4df2cd1e1391575a327c2a90ba4315f805a0a78 1497371 |
|
27-Jun-2013 |
covener |
authnzldap: support "none" as a filter to suppress using a search filter,
which is required by some mainframe security products serving native
registry over LDAP. |
c30d8ce98955da26bfa9c8c7eab3b4247daba5b4 1496202 |
|
24-Jun-2013 |
covener |
revert r1496183, leave at DEBUG. This not a subgroup message. |
b8b267da7a738d5cbe0c73e3e9dffa31386c412e 1496194 |
|
24-Jun-2013 |
covener |
attribute and error reason reversed |
b8278c227c7ee0f0dba8ca6d27f6aa8eae003fc0 1496183 |
|
24-Jun-2013 |
covener |
Drop severity from DEBUG to trace4: "... didn't match with attr DN failed group verification."
(This is just mod_authnz_ldap trying multiple atribbutes to discover LDAP subgroups) |
18809102aca48434dfc0c7acb964f605e68ea6c9 1493330 |
|
15-Jun-2013 |
jailletc36 |
Correct typo in error message |
02881698c37253936bb9ed43a36a457f3d305115 1433478 |
|
15-Jan-2013 |
druggeri |
Add helper function to execute command w args and get one line of output. Allow AuthLDAPBindPassword to have exec: argument like SSLPassPhraseDialog |
f66c725ff173e211ff58df6e894ab9c874ada5f3 1231257 |
|
13-Jan-2012 |
covener |
whitespace only: shift a block refactored in r1231255 over 8 spaces. |
b40bfdb714672f972887f9f1f1e154e00125bb68 1231255 |
|
13-Jan-2012 |
covener |
*) mod_authnz_ldap: Don't try a potentially expensive nested groups
search before exhausting all AuthLDAPGroupAttribute checks on the
current group. PR52464 |
185aa71728867671e105178b4c66fbc22b65ae26 1209766 |
|
03-Dec-2011 |
sf |
Add lots of unique tags to error log messages |
5bfaaf573bacb45c1cf290ce85ecc676587e8a64 1174751 |
|
23-Sep-2011 |
jim |
Cleanup effort in prep for GA push:
Trim trailing whitespace... no func change |
43ebb834c31efb8d902f2876dfb95e17ad39fc86 1157357 |
|
13-Aug-2011 |
sf |
Compare value instead of string pointer
Remove unused label
Remove unused var |
22ce742224c6aeadcb31b381c203232f578fc507 1156007 |
|
10-Aug-2011 |
covener |
remove (the only) retry logic in mod_authnz_ldap's authentication path
because it's causing the ample retries in mod_ldap to be multiplied by this
outter loop. |
ab86c68ce36c715e93f403dde41d0b9c1522c8b0 1150179 |
|
23-Jul-2011 |
sf |
Merge branch revert-ap-ldap:
Revert ap_ldap integration due to veto by Graham Leggett
Mailing list threads:
http://mail-archives.apache.org/mod_mbox/httpd-dev/201106.mbox/%3C4192DC1D-C0B9-42BB-B614-C3A41290F18B@sharp.fm%3E
http://mail-archives.apache.org/mod_mbox/httpd-dev/201107.mbox/%3C4E15E51E.4090700@rowe-clan.net%3E |
bede2929837dfd23863ad4b39199c63126566d61 1140069 |
|
27-Jun-2011 |
jorton |
Fix load order dependencies in LDAP code by switching to use of APR
optional functions for the inter-module API:
* modules/ldap/ldap_private.h: New file, containing "real" function
declarations, copied from...
* include/ap_ldap.h.in, include/ap_ldap_url.h,
include/ap_ldap_option.h, include/ap_ldap_init.h,
include/ap_ldap_rebind.h: ... here. All declarations changed to APR
optional function declarations.
* modules/ldap/util_ldap.c (util_ldap_register_hooks): Register all
the new optional functions.
* modules/aaa/mod_authnz_ldap.c (ImportULDAPOptFn): Pick up optional
function stub for ap_ldap_url_parse.
(mod_auth_ldap_parse_url): Use it here. |
3c290fd0361d6d9d84d97725eaf299456bddd6cf 1138627 |
|
22-Jun-2011 |
sf |
Various code cleanup
PR: 51398
Submitted by: Christophe Jaillet <christophe jaillet wanadoo fr> |
328106dab4706c964329eb20ad8173e1dbd2d32a 1129808 |
|
31-May-2011 |
wrowe |
Incorporate the ap_ldap incomplete API, as there is no interest or effort
at APR to make this a complete abstraction, and it was voted 'off the island'
with APR 2.0. This will allow httpd 2.3 to build against either apr-2.0
or apr+util 1.x. |
9d4ce88bcd21b01619a31c53db11a51c2a1e9717 1125646 |
|
21-May-2011 |
sf |
Some LDAP servers (wrongly) return LDAP_CONSTRAINT_VIOLATION if a user is
locked due to too many password retries. This should not cause an internal
server error but be treated as "auth denied". |
6137a8d5cdc62f1d4dad8cbf720feaa35f42a596 1100786 |
|
08-May-2011 |
covener |
PR51163: Resolve crashes when LDAP is used for authorization-only
Submitted By: Scott Hill <shill genscape.com> |
aef7b8f835c4bba6a20e47f0a08c196c34b6f274 1088627 |
|
04-Apr-2011 |
covener |
* add the constructed filter at TRACE1 to authn, and to existing debug authz
messages.
* Drop the level of the LDAPURL parsing to TRACE1 from debug (appears in
console/event viewer once per directive) |
97cc46935ec496b83fef9d6feb094d706c895b3b 998706 |
|
19-Sep-2010 |
sf |
Allow authz providers to check args while reading the config and allow
them to cache parsed args.
Use this to check that argument to 'all' provider is 'granted' or 'denied'. |
89c7a19f9c47b03f00f622a979490c9bccb2ff03 982016 |
|
03-Aug-2010 |
sf |
- Remove a load of unused variables (or variables that are set but never read).
- Move some declarations into the correct #ifdef scope.
I couldn't compile/test netware, but the changes look obvious enough. |
18b5268e013574026b2503b1641baf3299045f45 964156 |
|
14-Jul-2010 |
sf |
The approach for allowing authorization by user or IP introduced in r956387,
etc. causes problems because the authentication module calls
note_*_auth_failure if authentication fails. This is inappropriate if access is
later allowed because of the IP.
So, instead of calling the auth_checker hook even if authentication failed, we
introduce a new access_checker_ex hook that runs between the access_checker and
the check_user_id hooks. If an access_checker_ex functions returns OK, the
request will be allowed without authentication.
To make use of this, change mod_authz_core to walk the require blocks in the
access_checker_ex phase and deny/allow the request if the authz result does not
depend on an authenticated user. To distinguish a real AUTHZ_DENIED from an
authz provider from an authz provider needing an authenticated user, the latter
must return the new AUTHZ_DENIED_NO_USER code. |
6b20859dcddeb8613c75aa218bcc5d2a9fc3b6e7 956376 |
|
20-Jun-2010 |
sf |
more pid logging cleanup |
36ef8f77bffe75d1aa327882be1b5bdbe2ff567a 951895 |
|
06-Jun-2010 |
sf |
Use the new APLOG_USE_MODULE/AP_DECLARE_MODULE macros everywhere to take
advantage of per-module loglevels |
66c675ae570b38756f48a1cff7854b022b1777d0 950249 |
|
01-Jun-2010 |
covener |
When checking direct group membership, interpret LDAP_NO_SUCH_ATTRIBUTE the same as
LDAP_COMPARE_FALSE and continue on to subgroup (nested group) processing. This
triggers when the group has no "direct" members but may have entries that
represent nested groups to check. |
17efe57eb8d88fa0d371f4ac4939dbbbe78fd09b 950248 |
|
01-Jun-2010 |
covener |
mod_authnz_ldap: Search or Comparison during authorization phase
can use the credentials from the authentication phase
(AuthLDAPSearchAsUSer,AuthLDAPCompareAsUser).
PR 48340
Submitted by: Domenico Rotiroti, Eric Covener
Reviewed by: Eric Covener |
63ef6435829687cf597941fe392704ea98ee3267 949673 |
|
31-May-2010 |
rpluem |
* Fix compiler warning |
8068423ee2d80a7c42b2325a71c24ac9485327ce 949436 |
|
29-May-2010 |
covener |
mod_authnz_ldap: Allow the initial DN lookup to bind with a
transformation of the basic auth username. |
7703bad94964cc64022e08e2d1ae2c5fbfe2d3c6 949336 |
|
29-May-2010 |
covener |
Allow mod_authnz_ldap to set environment variables when it only performs authorization.
AuthLDAPAuthorizePrefix can be used to force this to overlap with the prefix used
for authentication.
PR 45584 |
505e342aefa9fbccc857f1bc653a310e25511946 902654 |
|
24-Jan-2010 |
sf |
mod_authnz_ldap: If AuthLDAPCharsetConfig is set, also convert the password to
UTF-8.
PR: 45318
Adapted patch from Johannes Müller |
dda254ba84bdff5e236917af1b31693ca4360eab 902641 |
|
24-Jan-2010 |
covener |
Change LDAP authentication failures (user->DN or password check) to log
level INFO from log level WARNING. This is still liberal for authn
providers. |
6c2782f8988f498ad9e5fc84256e202175c3edc9 881808 |
|
18-Nov-2009 |
covener |
Add AuthLDAPBindAuthoritative to allow other authentication providers a chance
to run when mod_authnz_ldap finds a user but can't verify their password.
Submitted By: Justin Erenkrantz, Joe Schaefer, Tony Stevenson |
85ae627e39e9a785862853d1c0f1eb8b91528923 745073 |
|
17-Feb-2009 |
trawick |
fix the name of this module in an error log message |
bfd8539f3983853abd2fd19de3aed408309791cd 732912 |
|
09-Jan-2009 |
rederpj |
mod_authnz_ldap: Reduce number of initialization debug messages and make
information more clear. PR 46342 [Dan Poirier] |
1ad5045fa49545553fa291326886c8fab228267f 707183 |
|
22-Oct-2008 |
chrisd |
Implement checks for NULL r->user as per r705361.
NOTE: If someone with an LDAP setup can ensure this compiles and works,
that would be great. |
e82c197ca8872669af89367746826fe6b9955bb3 693328 |
|
09-Sep-2008 |
niq |
mod_authnz_ldap: avoid returning NULL env vars
PR 39045 |
75031befec2825183c13931fc3266b56ed575c3d 678947 |
|
23-Jul-2008 |
covener |
revert r672639 which lacked a necessary major bump, add a major MMN bump
to account for the short-lived API addition/removal. |
a483543a4ce62ee99b5d1ac39f7dfbc3951ba691 672671 |
|
29-Jun-2008 |
covener |
caught by Ruediger |
9f8f1913ecffb74c74e1136a1dfa5ec6ea7452fb 672639 |
|
29-Jun-2008 |
covener |
mod_auth_digest: Detect during startup when AuthDigestProvider
is configured to use an incompatible provider via AuthnProviderAlias.
PR 45196 |
2e242dca7111f99d54dd144b7b8418d88d560032 658046 |
|
20-May-2008 |
chrisd |
Convert common provider version strings ("0") to
AUTHN/Z_PROVIDER_VERSION macros defined in mod_auth.h. |
a72211e92bab814bfa28ee086ca9b2a1a6095c92 644525 |
|
03-Apr-2008 |
chrisd |
Avoid calling access control hooks for internal requests with
configurations which match those of the initial request. Revert to
the original behaviour (call access control hooks for internal requests
with URIs different from the initial request) if any access control hooks
or providers are not registered as permitting this optimization.
Introduce wrappers for access control hook and provider registration
which can accept additional mode and flag data.
The configuration walk optimizations were originally proposed a while
ago (see http://marc.info/?l=apache-httpd-dev&m=116536713506234&w=2);
they have been used since then in production systems and appear to be
stable and effective. They permit certain combinations of modules
and clients to function efficiently, especially when a deeply recursive
series of internal requests, such as those generated by certain WebDAV
requests, are all subject to the identical authentication and authorization
directives.
The major change from the original proposal is a cleaner mechanism for
detecting modules which may expect the old behaviour. This has been
tested successfully with Subversion's mod_authz_svn, which specifically
requires the old behaviour when performing path-based authorization based
against its own private access control configuration files. |
4fc40742ec4793fe78c539d5d5e9c5ced17c0e39 633620 |
|
04-Mar-2008 |
covener |
return AUTHZ_GRANTED instead of OK from the LDAP nested group checking. |
6733d943c9e8d0f27dd077a04037e8c49eb090ff 607766 |
|
31-Dec-2007 |
covener |
When using the MS SDK, re-establish LDAP backend connections on a
return code of LDAP_UNAVAILABLE as if it were LDAP_SERVER_DOWN.
With this SDK, LDAP_UNAVAIALBLE is returned when the socket had been closed
between LDAP API calls.
PR 39095 |
10427b18718ac211a171484375fa45c7de8ff768 600017 |
|
01-Dec-2007 |
rederpj |
Ooops. Not sure why this didn't get deleted in the last commit to this file. This
is no longer required due to the more optimal way the list of subgroup attributes
is now handled. |
fcb21d3071e2b60730517cdc81b1a71584150115 599877 |
|
30-Nov-2007 |
rederpj |
Remove code that was both memory intensive and unnecessary. Replace the
complicated code with a simple list. |
d895dc20d9d1eb00561a8335312636330cfd7684 599872 |
|
30-Nov-2007 |
rederpj |
Improve logged information and fix broken doc. |
ecc1538af1c08282fc2773d2eb3f1a54251862f9 571798 |
|
01-Sep-2007 |
minfrin |
mod_authnz_ldap, mod_authn_dbd: Tidy up the code to expose authn parameters to the environment. Improve portability to EBCDIC machines by using apr_toupper() |
42a58c2174dae6edfc97af967add2f50baa85800 563244 |
|
06-Aug-2007 |
jim |
detabify |
3f5585f7f4a7d74f2f94ec729ea8c1879d419e35 560373 |
|
27-Jul-2007 |
rederpj |
mod_ldap, mod_authnzldap: Add support for nested groups (i.e. the ability
to authorize an authenticated user via a "require ldap-group X" directive
where the user is not in group X, but is in a subgroup contained in X.
PR 42891 [Paul J. Reder] |
f0f6f1b90ab582896f8a7d56d85bd62a55e57d90 557772 |
|
19-Jul-2007 |
covener |
revert revision 555470 |
f8e456f4117d8c58d5ec3fd9befe51af94cda3ed 555470 |
|
12-Jul-2007 |
covener |
This data is passed in an unsafe way to the LDAP SDK if the compiler
chooses to use shorts for the enum values.
http://www.redbooks.ibm.com/redbooks/SG245992/nn4/SG245992_88.html
Submitted by: David Jones |
a4ab95921be8ce5de50913cd6505d41b672eb375 466865 |
|
22-Oct-2006 |
minfrin |
mod_authn_dbd: Export any additional columns queried in the SQL select
into the environment with the name AUTHENTICATE_<COLUMN>. This brings
mod_authn_dbd behaviour in line with mod_authnz_ldap. |
1497efa2a5ac0d441f73f23947ef7611a9e44515 463427 |
|
12-Oct-2006 |
minfrin |
mod_authnz_ldap: Add an AuthLDAPRemoteUserAttribute directive. If
set, REMOTE_USER will be set to this attribute, rather than the
username supplied by the user. Useful for example when you want users
to log in using an email address, but need to supply a userid instead
to the backend. |
842ae4bd224140319ae7feec1872b93dfd491143 420983 |
|
11-Jul-2006 |
fielding |
update license header text |
bc0a9738ac95579b491ee4e83863815964162c34 413730 |
|
12-Jun-2006 |
trawick |
spellcheck |
8a1deda2e0273c1e4bc1c6fcf585bef89fdcdb49 411306 |
|
03-Jun-2006 |
bnicholes |
Fix a problem with invalid auth error detection for LDAP client SDKs that don't support LDAP_SECURITY_ERROR macro. PR#39529
Submitted by: [Ray Price <dohrayme yahoo.com>], [Josh Fenlason <jfenlason ptc.com>] |
3d81f57512275ca06a60a9bcbd23c1f8b429fdf2 395228 |
|
19-Apr-2006 |
colm |
Update the copyright year in all .c, .h and .xml files |
1d059d9367a93f45614cff0c6a3ab56b8b397617 386437 |
|
16-Mar-2006 |
trawick |
Clean up some string manipulation.
Submitted by: Christophe JAILLET <christophe.jaillet wanadoo.fr>
Reviewed by: Jeff Trawick
PR: 38701 |
367d146f245f3b1c9f77c18e6ec591b52e0b344c 368027 |
|
11-Jan-2006 |
bnicholes |
Authz refactoring
Merge from branches/authz-dev
Basically here is a list of what has been done:
- Convert all of the authz modules from hook based to provider based
- Remove the ap_requires field from the core_dir_config structure
- Remove the function ap_requires() since its functionality is no
longer supported or necessary in the refactoring
- Remove the calls to ap_some_auth_required() in the core request
handling to allow the hooks to be called in all cases.
- Add the new module mod_authz_core which will act as the authorization
provider vector and contain common authz directives such as 'Require',
'Reject' and '<RequireAlias>'
- Add the new module mod_authn_core which will contain common
authentication directives such as 'AuthType', 'AuthName' and
'<AuthnProviderAlias>'
- Move the check for METHOD_MASK out of the authz providers and into
the authz_core provider vector
- Define the status codes that can be returned by the authz providers
as AUTHZ_DENIED, AUTHZ_GRANTED and AUTHZ_GENERAL_ERROR
- Remove the 'Satisfy' directive
- Implement the '<RequireAll>', '<RequireOne>' block directives to
handle the 'and' and 'or' logic for authorization.
- Remove the 'AuthzXXXAuthoritative' directives from all of the authz
providers
- Implement the 'Reject' directive that will deny authorization if the
argument is true
- Fold the 'Reject' directive into the '<RequireAll>', '<RequireOne>'
logic
- Reimplement the host based authorization functionality provided by
'allow', 'deny' and 'order' as authz providers
- Remove the 'allow', 'deny' and 'order' directives
- Merge mod_authn_alias into mod_authn_core
- Add '<RequireAlias>' functionality which is similar to
'<AuthnProviderAlias>' but specific to authorization aliasing
- Remove all of the references to the 'authzxxxAuthoritative'
directives from the documentation
- Remove the 'Satisfy' directive from the documentation
- Remove 'Allow', 'Deny', 'Order' directives from the documentation
- Document '<RequireAll>', '<RequireOne>', 'Reject' directives
- Reimplement the APIs ap_auth_type(), ap_auth_name() as optional
functions and move the actual implementation into mod_authn_core
- Reimplement the API ap_some_auth_required() as an optional function
and move the actual implementation into mod_authz_core
Major Changes:
- Added the directives <RequireAll>, <RequireOne>, <RequireAlias>,
Reject
- Expanded the functionality of the directive 'Require' to handle all
authorization and access control
- Added the new authz providers 'env', 'ip', 'host', 'all' to handle
host-based access control
- Removed the directives 'Allow', 'Deny', 'Order', 'Satisfy',
'AuthzXXXAuthoritative'
- Removed the ap_require() API
- Moved the directives 'AuthType', 'AuthName' out of mod_core and into
mod_authn_core
- Moved the directive 'Require' out of mod_core and into
mod_authz_core
- Merged mod_authn_alias into mod_authn_core
- Renamed mod_authz_dbm authz providers from 'group' and 'file-group'
to 'dbm-group' and 'dbm-file-group'
Benefits:
- All authorization and access control is now handle through two
directives, 'Require' and 'Reject'
- Authorization has been expanded to allow for complex 'AND/OR' control
logic through the directives '<RequireAll>' and '<RequireOne>'
- Configuration is now much simpler and consistent across the board
- Other modules like mod_ssl and mod_proxy should be able to plug into
and take advantage of the same provider based authorization mechanism
by implementing their own providers
Issues:
- Backwards compatibility between 2.2 and 2.3 configurations will be
broken in the area of authorization and access control due to the fact
that the directives 'allow', 'deny', 'order' and 'satisfy' have been
removed. When moving from 2.2 to 2.3 these directives will have to be
changed to 'Require all granted', 'Require all denied' or some variation
of the authz host-based providers.
- Existing third party authorization modules will have to adapt to the
new structure. |
000a8c6178f8eaf7ee3c3f6efc978eb1c85a19fd 358040 |
|
20-Dec-2005 |
wrowe |
This shift was treated in 32 bit scope, then masked to 64 bits,
which was probably quite uncool. |
e8f95a682820a599fe41b22977010636be5c2717 332306 |
|
10-Nov-2005 |
jim |
No functional Change: Removing trailing whitespace. This also
means that "blank" lines consisting of just spaces or
tabs are now really blank lines |
43c3e6a4b559b76b750c245ee95e2782c15b4296 332305 |
|
10-Nov-2005 |
jim |
No functional change: simple detabbing of indented code. |
e86a2e29253f12668284e382d24114512f480992 265047 |
|
31-Aug-2005 |
jim |
Start of getpid()/%d confusion fix... |
31f7cfc857333ccd471df77786a7763e5bdf0954 230895 |
|
08-Aug-2005 |
jim |
Ensure that req->dn is valid for the util_ldap_cache_compare() call.
Esp make sure not null. |
796e4a7141265d8ed7036e4628161c6eafb2a789 225794 |
|
28-Jul-2005 |
jorton |
* modules/ldap/util_ldap.c, modules/aaa/mod_authnz_ldap.c: Stop using
APLOG_NOERRNO throughout. |
0b981bb8837f4db5cc61839ee14563b683606817 225587 |
|
27-Jul-2005 |
jorton |
* modules/aaa/mod_authnz_ldap.c (authz_ldap_check_user_access): Remove
unused variable. |
8b31ab7834de54e6b41f134f9aaec4bebd5632a2 168644 |
|
06-May-2005 |
bnicholes |
Backing out the AuthLDAPAllowDNAuth patch from r168016. Because of LDAP filter issues this patch still can't guarantee unique results. |
f6dfc2fa2b7eabc01ccee757bc852b14c4b5e8cf 168016 |
|
04-May-2005 |
bnicholes |
Add the directive AuthLDAPAllowDNAuth to allow a user to authenticate against an LDAP directory using a full user DN. This directive allows a user to authenticate against a subcontext that may contain non-unique user IDs. |
f43b67c5a9d29b572eac916f8335cedc80c908be 159619 |
|
31-Mar-2005 |
bnicholes |
Implement the exported function from mod_ldap(util_ldap) as optional functions so that we can eliminate the load ordering of mod_ldap and mod_authnz_ldap. |
08cb74ca432a8c24e39f17dedce527e6a47b8001 151408 |
|
04-Feb-2005 |
jerenkrantz |
Update copyright year to 2005 and standardize on current copyright owner line. |
560fd0658902ab57754616c172d8953e69fc4722 151083 |
|
03-Feb-2005 |
bnicholes |
Allow AuthLDAPURL to override the default connection type with an option second parameter of NONE, SSL or TLS | STARTTLS |
5c0419d51818eb02045cf923a9fe456127a44c60 124279 |
|
05-Jan-2005 |
wrowe |
Correct the order of includes to follow httpd conventions, and get
Win32 compiling again. |
264ab3e3ae1e2dc96aa7f54f3004984e8e9bdbc2 106077 |
|
21-Nov-2004 |
wrowe |
Axe a dead variable |
5ccaf20c70d1b5550e8c67f71a18dcbd44be0303 105697 |
|
06-Nov-2004 |
bnicholes |
Return the correct error when the user object is not found |
dae3cb64cc6681b5f6b0fd12e7f8f6296ffaa19a 105694 |
|
05-Nov-2004 |
bnicholes |
Added the directive "Requires ldap-filter" that allows the module to only authorize a user based on a complex LDAP search filter. |
0e80b44ae72e5f111581fabf153ad0d2532aa80e 105675 |
|
03-Nov-2004 |
bnicholes |
Added the directive "Requires ldap-attribute" that allows the module to only authorize a user if the attribute value specified matches the value of the user object. PR 31913
Submitted by: Ryan Morgan <rmorgan pobox.com>
Reviewd by: Brad Nicholes |
c23e501e3dfa4414a310ae311073bb64649c63ee 105669 |
|
02-Nov-2004 |
bnicholes |
Allow mod_authnz_ldap authorization functionality to be used without requiring the user to also be authenticated through mod_authnz_ldap. This allows other authentication modules to take advantage of LDAP authorization only [PR 28253]
Submitted by: Jari Ahonen [jah progress.com]
Reviewed by: Brad Nicholes |
380302b138fb8f33395f2264a3d3c6facb53ef4b 105415 |
|
12-Oct-2004 |
jorton |
* modules/aaa/mod_authnz_ldap.c: Fix /*-within-comment warning. |
320ffe87a55e6172f91e051a2151790755446690 105379 |
|
05-Oct-2004 |
minfrin |
mod_auth_ldap: Handle the inconsistent way in which the MS LDAP
library handles special characters.
PR: 24437
Obtained from:
Submitted by: Jess Holle
Reviewed by: |
e18ba90a1e610b43062e90cfa8bf0c1edcad7a49 104727 |
|
19-Aug-2004 |
bnicholes |
Clean up some compiler warnings |
1629c3e2cb9504d01c1dfa773618b89cad5bc256 104706 |
|
18-Aug-2004 |
minfrin |
Clarify an error message to tell the user what to do if apr-util lacks
LDAP support.
PR:
Obtained from:
Submitted by:
Reviewed by: |
302abf53d2b1a686f6eafd445c49e1e006afb190 104696 |
|
18-Aug-2004 |
bnicholes |
Re-structure the auth_ldap module to fit the new authentication model. The authnz_ldap module provides an ldap authentication provider and an authorization handler. It implements the authorization "require" values ldap-user, ldap-dn and ldap-group. This restructure also moves auth_ldap out of the experimental directory. |