Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [higgins-dev] Making progress on higgins.eclipse.org

I am still struggling with configuring the LDAP CP. My higgins.config.xml 
file looks like:
<bci:realms 
xmlns:bci="http://www.bandit-project.org/commonidentity"; 
xmlns:xacml="urn:oasis:names:tc:xacml:2.0:policy:schema:os" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";>
        <bci:realm 
 connectorType="org.bandit.ia.connectors.LDAPConnectorInitialCtxFactory" 
        desc="Higgins LDAP Directory" 
        id="6289E76C-0883-49f1-9DCE-85293A83ED3E">
                <bci:connection xsi:type="bci:LDAPConnector">
                        <bci:address>ldap://localhost:389</bci:address>
                        <bci:dsnameprefix>uid=</bci:dsnameprefix>
 
<bci:dsnamepostfix>,ou=identities,dc=higgins,dc=eclipse,dc=org</bci:dsnamepostfix>
                </bci:connection>
                <bci:env prop="java.naming.security.authentication" 
value="simple" />
        </bci:realm>
</bci:realms>

I am getting the error:
LDAPContextFactory::canCreate: 
file:///C:/higgins.config.xml?id=Corporate-LDAP-Server
JNDIContextFactory.canCreate (?): Invalid connector type specified in 
configuration.

I am using LDAP CP Build 285 (sent to me by Jim S). I cannot find the JAR 
file containing the class 
"org.bandit.ia.connectors.LDAPConnectorInitialCtxFactory". Did the class 
name change, is the JAR file missing?

Thanks,
Mike


higgins-dev-bounces@xxxxxxxxxxx wrote on 01/09/2007 01:07:55 PM:

> Mike,
> 
> The java.naming.security.authentication values for the sun JNDI 
> provider we're using are documented here: http://java.sun.
> com/products/jndi/tutorial/ldap/security/auth.html.  BTW, if you 
> would like us to install an eDirectory LDAP server on an eclipse 
> server, we'd be happy to set one up for you.  However, we really 
> don't have any experiences with the intricacies of setting up and 
> configuring other LDAP service providers.
> 
> Tom
> 
> >>> Michael McIntosh <mikemci@xxxxxxxxxx> 1/9/2007 10:47 AM >>>
> higgins-dev-bounces@xxxxxxxxxxx wrote on 01/09/2007 11:29:41 AM:
> 
> > Mike,
> > 
> > We hard coded some tables into the LDAP CP to handle mapping of 
> > claim URI's in and out of the CP.  However, those attribute 
> > definitions are not required by the CP to exist in the schema of the
> > backing LDAP store.  If the IdAS consumer asks for "http://schemas.
> > xmlsoap.org/ws/2005/05/identity/claims/emailaddress" the map 
> > dictates that the LDAP CP ask for several possibilities ("mail", "e-
> > mail", "emailaddress", "rfc822mail", etc.) any of which, if they do 
> > not exist, will not be a problem.  No results will be returned.  As 
> > I said earlier, this hard coded table will be removed from the LDAP 
> > CP when our mapping CP is implemented.  Then, this kind of mapping 
> > specification will be done in the mapping CP configuration file.  At
> > any rate, the upshot is, the CP still doesn't require any schema, 
> > our reference application does.  I'll check on the exact LDAP 
> > classes and attributes being used by it and send you those under 
> > separate cover.
> > 
> > The values for java.naming.security.authentication and java.naming.
> > ldap.attributes.binary are a couple of many environment variables 
> > which can be specified to control the behavior of some of the JNDI 
> > API calls.  Specifically, java.naming.security.authentication in 
> > this case specifies that we're doing simple user name\password 
> > authentication.  The java.naming.ldap.attributes.binary variable 
> 
> What other values/authentication methods are possible/supported?
> 
> > specifies that the "GUID" attribute is to be returned in binary 
> > format rather than base64Binary (I think that's the default format).
> > 
> > Tom
> > 
> > >>> Michael McIntosh <mikemci@xxxxxxxxxx> 1/8/2007 12:44 PM >>>
> > higgins-dev-bounces@xxxxxxxxxxx wrote on 01/08/2007 01:48:55 PM:
> > 
> > > Mike,
> > > 
> > > The LDAP CP does not require any particular set of schema to be 
> > > present.  Applications may, but the CP itself does not.  The 
> > 
> > I guess I am confused. If no specific schema is required, how does the 

> CP 
> > decide which attributeValue from LDAP should be used when it is asked 
> for 
> > one of the Claim URIs?
> > 
> > > required CP configuration isn't too bad, I'll include the config we 
> > > used on the WAG server for the IIW demo here:
> > > 
> > > <bci:realms 
> > > xmlns:bci="http://www.bandit-project.org/commonidentity"; 
> > > xmlns:xacml="urn:oasis:names:tc:xacml:2.0:policy:schema:os" 
> > > xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";>
> > >         <bci:realm 
> > >         connectorType="org.bandit.ia.connectors.
> > > LDAPConnectorInitialCtxFactory" 
> > >         desc="Corporate LDAP Directory"
> > >         id="Corporate-LDAP-Server">
> > >                 <bci:connection xsi:type="bci:LDAPConnector">
> > > <bci:address>ldap://localhost:389</bci:address>
> > >                         <bci:dsnameprefix>cn=</bci:dsnameprefix>
> > >                         <bci:dsnamepostfix>,ou=people,dc=wag,
> > > dc=bandit-project,dc=org</bci:dsnamepostfix>
> > >                 </bci:connection>
> > >                 <bci:env prop="java.naming.security.authentication" 
> > > value="simple" />
> > >                 <bci:env prop="java.naming.ldap.attributes.binary" 
> > > value="GUID" />
> > >         </bci:realm>
> > > </bci:realms>
> > > 
> > > Note that the name prefix configuration is what allowed us to pass 
> > > simple names thru IdAS to the LDAP CP like "tdoman".  This will go 
> > > away when we finish our mapping CP implementation.
> > 
> > Can you say more about allowed values for 
> > java.naming.security.authentication and 
> > java.naming.ldap.attributes.binary?
> > 
> > > As for the LDAP store itself and what data is there, what would you 
> > > like to do?  Here are a few choices:
> > > 1. Point your LDAP CP configuration at the LDAP directory running on
> > > ldap://wag.bandit-project.org or ldaps://wag.bandit-project.org.
> > > 2. Use the Novell created LDAP utility we've used to unit test our 
> > > LDAP CP while it was developed in the bandit project.  It's backed 
> > > by an XML file with it's own format.
> > > 3. Install, configure, and populate an LDAP server\store of your 
own.
> > 
> > I am leaning towards #3 since I'd like the install to be as self 
> contained 
> > as possible (and the Eclipse Firewall rules are brutal).
> > I tried #2, but it seems to require X Windows on Linux and that 
machine 
> > does not have it installed.
> > 
> > > Thanks,
> > > Tom
> > > 
> > > >>> Michael McIntosh <mikemci@xxxxxxxxxx> 1/7/2007 9:22 AM >>>
> > > Tom,
> > > 
> > > I am not very directory server savvy - can you send me whatever 
schema 
> 
> > > files and other configuration details I'd need to have a directory 
> work 
> > > with your LDAP CP?
> > > 
> > > Thanks,
> > > Mike
> > > 
> > > higgins-dev-bounces@xxxxxxxxxxx wrote on 01/02/2007 01:19:08 PM:
> > > 
> > > > Mike,
> > > > 
> > > > You shouldn't need anything more than what we've already setup on 
> > > > the demo machines with the exception of an LDAP server of your 
> > > > choice.  The LDAP CP configuration file would only need to be 
> > > > modified to point at that source.  Of course, it'd be up to you to 

> > > > make sure that the data you want is loaded there as well.  Anyway, 

> > > > what else do you need help with?
> > > > 
> > > > Tom
> > > > 
> > > > >>> Michael McIntosh <mikemci@xxxxxxxxxx> 12/21/06 1:32 PM >>>
> > > > Thanks to Valery, I've made some progress on configuring 
> > > > higgins.eclipse.org.
> > > > I need to get the LDAP CP configured on this machine.
> > > > Can someone from Novell help me to understand what needs to be 
> > installed 
> > > 
> > > > and configured on this machine?
> > > > 
> > > > thanks,
> > > > Mike
> > > > _______________________________________________
> > > > higgins-dev mailing list
> > > > higgins-dev@xxxxxxxxxxx 
> > > > https://dev.eclipse.org/mailman/listinfo/higgins-dev 
> > > > _______________________________________________
> > > > higgins-dev mailing list
> > > > higgins-dev@xxxxxxxxxxx 
> > > > https://dev.eclipse.org/mailman/listinfo/higgins-dev 
> > > 
> > > _______________________________________________
> > > higgins-dev mailing list
> > > higgins-dev@xxxxxxxxxxx 
> > > https://dev.eclipse.org/mailman/listinfo/higgins-dev 
> > > _______________________________________________
> > > higgins-dev mailing list
> > > higgins-dev@xxxxxxxxxxx 
> > > https://dev.eclipse.org/mailman/listinfo/higgins-dev 
> > 
> > _______________________________________________
> > higgins-dev mailing list
> > higgins-dev@xxxxxxxxxxx 
> > https://dev.eclipse.org/mailman/listinfo/higgins-dev 
> > _______________________________________________
> > higgins-dev mailing list
> > higgins-dev@xxxxxxxxxxx 
> > https://dev.eclipse.org/mailman/listinfo/higgins-dev 
> 
> _______________________________________________
> higgins-dev mailing list
> higgins-dev@xxxxxxxxxxx 
> https://dev.eclipse.org/mailman/listinfo/higgins-dev
> _______________________________________________
> higgins-dev mailing list
> higgins-dev@xxxxxxxxxxx
> https://dev.eclipse.org/mailman/listinfo/higgins-dev



Back to the top