Lines Matching refs:user

64     int user_is_dn;                 /* If true, r->user is replaced by DN during authn */
65 char *remote_user_attribute; /* If set, r->user is replaced by this attribute during authn */
70 apr_array_header_t *groupattr; /* List of Group attributes identifying user members. Default:"member uniqueMember" */
88 char *user; /* The username provided by the client */
207 const char *user,
228 inbytes = strlen(user);
232 /* Convert the user name to UTF-8. This is only valid for LDAP v3 */
233 if (apr_xlate_conv_buffer(convset, user, &inbytes, outbuf, &outbytes) == APR_SUCCESS) {
234 user = outbuf;
256 for (p = user, q=filtbuf + len;
286 for (p = user, q=filtbuf + len;
395 r->user = (char *)apr_pstrdup(r->pool, vals[i]);
404 static const char *ldap_determine_binddn(request_rec *r, const char *user) {
407 const char *result = user;
410 if (NULL == user || NULL == sec || !sec->bind_regex || !sec->bind_subst) {
414 if (!ap_regexec(sec->bind_regex, user, AP_MAX_REG_MATCH, regm, 0)) {
415 char *substituted = ap_pregsub(r->pool, sec->bind_subst, user, AP_MAX_REG_MATCH, regm);
451 * authenticate this user, and leave the default credentials */
497 * This phase authenticates the credentials the user has sent with
499 * by making an attempt to bind to the LDAP server using this user's
503 static authn_status authn_ldap_check_password(request_rec *r, const char *user,
540 binddn = ldap_determine_binddn(r, user);
565 if (user == NULL) {
567 "auth_ldap authenticate: no user specified");
573 if (APR_SUCCESS != authn_ldap_build_filter(filtbuf, r, user, NULL, sec)) {
587 /* do the user search */
597 "auth_ldap authenticate: user %s authentication failed; "
599 user, r->uri, ldc->reason, ldap_err2string(result));
605 "user %s authentication failed; URI %s [%s][%s]",
606 user, r->uri, ldc->reason, ldap_err2string(result));
627 /* At least Sun Directory Server sends this if a user is
635 /* mark the user and DN */
637 req->user = apr_pstrdup(r->pool, user);
640 r->user = req->dn;
652 "LDAP query for the user. REMOTE_USER will fall "
658 "auth_ldap authenticate: accepting %s", user);
674 if (APR_SUCCESS != authn_ldap_build_filter(filtbuf, r, r->user, NULL, sec)) {
681 /* Search for the user DN */
693 req->user = r->user;
717 if (!r->user) {
751 if (!strlen(r->user)) {
759 "auth_ldap authorize: require user: user's DN has not "
767 "auth_ldap authorize: require user: Can't evaluate expression: %s",
774 * require user Babs Jensen
780 "auth_ldap authorize: require user: authorization "
787 "auth_ldap authorize: require user: "
803 "require user: authorization successful");
810 "require user: authorization failed [%s][%s]",
817 "auth_ldap authorize user: authorization denied for "
818 "user %s to %s",
819 r->user, r->uri);
845 if (!r->user) {
913 if (!strlen(r->user)) {
925 "auth_ldap authorize: require group: user's DN has "
926 "not been defined; failing authorization for user %s",
927 r->user);
932 if (req->user == NULL || strlen(req->user) == 0) {
934 * chance to set the user field. Do so now. */
935 req->user = r->user;
960 sec->group_attrib_is_dn ? req->dn : req->user, t);
963 sec->group_attrib_is_dn ? req->dn : req->user);
996 sec->group_attrib_is_dn ? req->dn : req->user,
1022 "user %s to %s",
1023 r->user, r->uri);
1046 if (!r->user) {
1066 if (!strlen(r->user)) {
1096 "auth_ldap authorize: require dn: user's DN has not "
1121 "user %s to %s",
1122 r->user, r->uri);
1146 if (!r->user) {
1166 if (!strlen(r->user)) {
1186 "auth_ldap authorize: require ldap-attribute: user's DN "
1228 "user %s to %s",
1229 r->user, r->uri);
1255 if (!r->user) {
1275 if (!strlen(r->user)) {
1295 "auth_ldap authorize: require ldap-filter: user's DN "
1315 if (APR_SUCCESS != authn_ldap_build_filter(filtbuf, r, req->user, t, sec)) {
1322 /* Search for the user DN */
1326 /* Make sure that the filtered search returned the correct user dn */
1365 "user %s to %s",
1366 r->user, r->uri);
1416 /* Search for the user DN */
1741 "is the user name passed by the HTTP client. The search will be a subtree "
1753 "Set to 'on' to return failures when user-specific bind fails - defaults to on."),
1758 "DN of the remote user. By default, this is set to off, meaning that "
1759 "the REMOTE_USER variable will contain whatever value the remote user sent."),
1763 "Override the user supplied username and place the "
1786 "A list of attribute labels used to identify the user members of groups - defaults to "
1983 ap_register_auth_provider(p, AUTHZ_PROVIDER_GROUP, "ldap-user",