• Open Menu Close Menu
  • Apple
  • Shopping Bag
  • Apple
  • Mac
  • iPad
  • iPhone
  • Watch
  • TV
  • Music
  • Support
  • Search apple.com
  • Shopping Bag

Lists

Open Menu Close Menu
  • Terms and Conditions
  • Lists hosted on this site
  • Email the Postmaster
  • Tips for posting to public mailing lists
Re: LDAP
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: LDAP


  • Subject: Re: LDAP
  • From: Martin Crane <email@hidden>
  • Date: Fri, 11 Nov 2005 12:40:14 +0000

Indeed, I did find the FindUsersAuthInfo function that only requires the user name since I wrote back, and I've been trying to figure out what I needed to do from there. Looks like you might have saved me from further searching.. thank you!

-Martin

PS. Is it really 3am for you? Get some sleep!

On 11 Nov 2005, at 10:53, Quinn wrote:

At 9:16 +0000 11/11/05, Martin Crane wrote:
Sorry, maybe I phrased my original question badly.  I don't want to authenticate the user, as seems to be the requirement in the CryptNoMore sample. I simply want to find out the server which already authenticated the user at the Login Window and retrieve its LDAP search base - that which is set either in the Directory Access app or supplied via a DHCP offer.

Right.  My point in directing you to CryptNoMore is that:

a) you need to find out which directory node (that is, which LDAP server) authenticated the user

b) CryptNoMore gets that information (the AppleMetaNodeLocation attribute of the user's Directory Services record) as part of its operation

c) the Directory Services API is complex, so it's better for you to start with CryptNoMore than to try and figure it out from scratch yourself

I answered a similar question for a developer quite recently.  They were doing advanced printer authentication, and wanted to know, for a given user ID, whether that user was authenticated via Active Directory and, if so, what their Active Directory user name and Active Directory domain was.  Sounds similar, huh?

I solved this problem by starting with CryptNoMore and bashing the code until it returned the attributes I needed.  The vast bulk of the code didn't change.  I've included the new code at the end of this email.

[btw Just for the record, the technique shown in this code is slightly wrong.  After consulting with Apple's Active Directory DS plugin engineer, we decided that the best solution for getting the AD domain is to simply string the "/Active Directory/" from the front of the AppleMetaNodeLocation attribute's value.  This is preferred over accessing the "dsAttrTypeNative:ADDomain" attribute.  However, this change is highly AD specific, and thus irrelevant to my proposed solution to your LDAP problem.]

S+E
-- 
Quinn "The Eskimo!"                    <http://www.apple.com/developer/>
Apple Developer Technical Support * Networking, Communications, Hardware

<snip>

Regards,

Martin Crane
Macintosh Software Engineer
http://www.vicomsoft.com
Policing For Productivity
________________________________________________________
Vicomsoft is a dynamic market leader in Content Filtering, Internet Connectivity and Firewall Software, with an award-winning portfolio specifically designed for Mac OS X and Windows
________________________________________________________


 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Macnetworkprog mailing list      (email@hidden)
Help/Unsubscribe/Update your Subscription:

This email sent to email@hidden

References: 
 >Intercepting IPv6 ND packets (From: Jonathan Wood <email@hidden>)
 >Re: Intercepting IPv6 ND packets (From: "Peter Lovell" <email@hidden>)
 >Re: Intercepting IPv6 ND packets (From: Jonathan Wood <email@hidden>)
 >Re: Intercepting IPv6 ND packets (From: Josh Graessley <email@hidden>)
 >Re: Intercepting IPv6 ND packets (From: Jonathan Wood <email@hidden>)
 >LDAP (From: Martin Crane <email@hidden>)
 >Re: LDAP (From: Quinn <email@hidden>)
 >Re: LDAP (From: Martin Crane <email@hidden>)
 >Re: LDAP (From: Quinn <email@hidden>)

  • Prev by Date: Re: LDAP
  • Next by Date: Kernel extension debugging tool?
  • Previous by thread: Re: LDAP
  • Next by thread: Re: Detecting 2 Ethernet inbuilt
  • Index(es):
    • Date
    • Thread