[Date Prev][Date Next] [Chronological] [Thread] [Top]

Access Control Question



Does anybody have some good references to help in debugging an access
control problem?  I have a third party security product that can use
LDAP to authenticate.  Right now it looks like the only user I can get
to authenticate is the rootdn, no other users seem to work.  I can see
the product connecting and performing a search using  a valid filter but
authentication fails anyway.  I was originally suspect of the security
software, or the possibility I had not compiled in the correct
encryption routines.  When I got the rootdn entry to work with its {SHA}
encrypted password it invalidated that theory.  Any ideas?

Thanks - Tod