Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

How can I setup authentication via atlassian Crowd

Hi

Openstack Version: Grizzly running on Ubuntu

I am trying to set up authentication from the Dashboard using atlassian Crowd. When I tried to configure the LDAP connection I get the following error:

LDAPError: (2, 'No such file or directory')
2014-03-20 18:22:48    ERROR [root] (2, 'No such file or directory')
Traceback (most recent call last):
  File "/usr/lib/python2.7/dist-packages/keystone/common/wsgi.py", line 284, in __call__
    result = method(context, **params)
  File "/usr/lib/python2.7/dist-packages/keystone/token/controllers.py", line 79, in authenticate
    context, auth)
  File "/usr/lib/python2.7/dist-packages/keystone/token/controllers.py", line 289, in _authenticate_local
    domain_id=DEFAULT_DOMAIN_ID)
  File "/usr/lib/python2.7/dist-packages/keystone/common/manager.py", line 47, in _wrapper
    return f(*args, **kw)
  File "/usr/lib/python2.7/dist-packages/keystone/identity/backends/ldap/core.py", line 151, in get_user_by_name
    ref = identity.filter_user(self.user.get_by_name(user_name))
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 301, in get_by_name
    res = self.get_all(query)
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 571, in get_all
    return super(EnabledEmuMixIn, self).get_all(filter)
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 309, in get_all
    for x in self._ldap_get_all(filter)]
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 280, in _ldap_get_all
    conn = self.get_connection()
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 160, in get_connection
    alias_dereferencing=self.alias_dereferencing)
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 370, in __init__
    self.conn = ldap.initialize(url)
  File "/usr/lib/python2.7/dist-packages/ldap/functions.py", line 92, in initialize
    return LDAPObject(uri,trace_level,trace_file,trace_stack_limit)
  File "/usr/lib/python2.7/dist-packages/ldap/ldapobject.py", line 69, in __init__
    self._l = ldap.functions._ldap_function_call(ldap._ldap_module_lock,_ldap.initialize,uri)
  File "/usr/lib/python2.7/dist-packages/ldap/functions.py", line 63, in _ldap_function_call
    result = func(*args,**kwargs)
LDAPError: (2, 'No such file or directory')

I only need to configure access through the dashboard.

Can anyone give me an example of the steps required.

How can I setup authentication via atlassian Crowd

Hi

Openstack Version: Grizzly running on Ubuntu

I am trying to set up authentication from the Dashboard using atlassian Crowd. When I tried to configure Here are the LDAP connection I get relevant sections of the following error:keystone.conf file

LDAPError: (2, 'No such file [identity]
driver = keystone.identity.backends.ldap.Identity

[ldap]
  url = https://sb-rtdi-crowd-01.build.sec.safran/crowd
  user = admin dc=Manager,dc=example,dc=com
password = ****
 suffix = cn=example,cn=com
  use_dumb_member = False
 allow_subtree_delete = False
 dumb_member = cn=dumb,dc=example,dc=com

# Maximum results per page; a value of zero ('0') disables paging (default)
 page_size = 0

# The LDAP dereferencing option for queries. This can be either 'never',
# 'searching', 'always', 'finding' or directory')
2014-03-20 18:22:48    ERROR [root] (2, 'No such file 'default'. The 'default' option falls
# back to using default dereferencing configured by your ldap.conf.
 alias_dereferencing = default

# The LDAP scope for queries, this can be either 'one'
# (onelevel/singleLevel) or directory')
Traceback (most recent call last):
  File "/usr/lib/python2.7/dist-packages/keystone/common/wsgi.py", line 284, in __call__
    result = method(context, **params)
  File "/usr/lib/python2.7/dist-packages/keystone/token/controllers.py", line 79, in authenticate
    context, auth)
  File "/usr/lib/python2.7/dist-packages/keystone/token/controllers.py", line 289, in _authenticate_local
    domain_id=DEFAULT_DOMAIN_ID)
  File "/usr/lib/python2.7/dist-packages/keystone/common/manager.py", line 47, in _wrapper
    return f(*args, **kw)
  File "/usr/lib/python2.7/dist-packages/keystone/identity/backends/ldap/core.py", line 151, in get_user_by_name
    ref = identity.filter_user(self.user.get_by_name(user_name))
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 301, in get_by_name
    res = self.get_all(query)
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 571, in get_all
    return super(EnabledEmuMixIn, self).get_all(filter)
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 309, in get_all
    for x in self._ldap_get_all(filter)]
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 280, in _ldap_get_all
    conn = self.get_connection()
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 160, in get_connection
    alias_dereferencing=self.alias_dereferencing)
  File "/usr/lib/python2.7/dist-packages/keystone/common/ldap/core.py", line 370, in __init__
    self.conn = ldap.initialize(url)
  File "/usr/lib/python2.7/dist-packages/ldap/functions.py", line 92, in initialize
    return LDAPObject(uri,trace_level,trace_file,trace_stack_limit)
  File "/usr/lib/python2.7/dist-packages/ldap/ldapobject.py", line 69, in __init__
    self._l = ldap.functions._ldap_function_call(ldap._ldap_module_lock,_ldap.initialize,uri)
  File "/usr/lib/python2.7/dist-packages/ldap/functions.py", line 63, in _ldap_function_call
    result = func(*args,**kwargs)
LDAPError: (2, 'No such file or directory')
'sub' (subtree/wholeSubtree)
 query_scope = one

 user_tree_dn = ou=Users,dc=example,dc=com
 user_filter =
 user_objectclass = inetOrgPerson
 user_domain_id_attribute = businessCategory
 user_id_attribute = cn
 user_name_attribute = sn
 user_mail_attribute = email
 user_pass_attribute = userPassword
 user_enabled_attribute = enabled
 user_enabled_mask = 0
 user_enabled_default = True
 user_attribute_ignore = tenant_id,tenants
 user_allow_create = True
 user_allow_update = True
 user_allow_delete = True
 user_enabled_emulation = False
 user_enabled_emulation_dn =

 tenant_tree_dn = ou=Groups,dc=example,dc=com
 tenant_filter =
 tenant_objectclass = groupOfNames
 tenant_domain_id_attribute = businessCategory
 tenant_id_attribute = cn
 tenant_member_attribute = member
 tenant_name_attribute = ou
 tenant_desc_attribute = desc
 tenant_enabled_attribute = enabled
 tenant_attribute_ignore =
 tenant_allow_create = True
 tenant_allow_update = True
 tenant_allow_delete = True
 tenant_enabled_emulation = False
 tenant_enabled_emulation_dn =

 role_tree_dn = ou=Roles,dc=example,dc=com
 role_filter =
 role_objectclass = organizationalRole
 role_id_attribute = cn
 role_name_attribute = ou
 role_member_attribute = roleOccupant
 role_attribute_ignore =
 role_allow_create = True
 role_allow_update = True
 role_allow_delete = True

 group_tree_dn =
 group_filter =
 group_objectclass = groupOfNames
 group_id_attribute = cn
 group_name_attribute = ou
 group_member_attribute = member
 group_desc_attribute = desc
 group_attribute_ignore =
 group_allow_create = True
 group_allow_update = True
 group_allow_delete = True

I only need to configure access through the dashboard.

Can anyone give me an example of the steps required.

How can I setup authentication via atlassian Crowd

Hi

Openstack Version: Grizzly running on Ubuntu

I am trying to set up authentication from the Dashboard using atlassian Crowd. Here are the relevant sections of the keystone.conf file

[identity]
driver = keystone.identity.backends.ldap.Identity

[ldap]
  url = https://sb-rtdi-crowd-01.build.sec.safran/crowd
<url>
  user = admin dc=Manager,dc=example,dc=com
password = ****
 suffix = cn=example,cn=com
  use_dumb_member = False
 allow_subtree_delete = False
 dumb_member = cn=dumb,dc=example,dc=com

# Maximum results per page; a value of zero ('0') disables paging (default)
 page_size = 0

# The LDAP dereferencing option for queries. This can be either 'never',
# 'searching', 'always', 'finding' or 'default'. The 'default' option falls
# back to using default dereferencing configured by your ldap.conf.
 alias_dereferencing = default

# The LDAP scope for queries, this can be either 'one'
# (onelevel/singleLevel) or 'sub' (subtree/wholeSubtree)
 query_scope = one

 user_tree_dn = ou=Users,dc=example,dc=com
 user_filter =
 user_objectclass = inetOrgPerson
 user_domain_id_attribute = businessCategory
 user_id_attribute = cn
 user_name_attribute = sn
 user_mail_attribute = email
 user_pass_attribute = userPassword
 user_enabled_attribute = enabled
 user_enabled_mask = 0
 user_enabled_default = True
 user_attribute_ignore = tenant_id,tenants
 user_allow_create = True
 user_allow_update = True
 user_allow_delete = True
 user_enabled_emulation = False
 user_enabled_emulation_dn =

 tenant_tree_dn = ou=Groups,dc=example,dc=com
 tenant_filter =
 tenant_objectclass = groupOfNames
 tenant_domain_id_attribute = businessCategory
 tenant_id_attribute = cn
 tenant_member_attribute = member
 tenant_name_attribute = ou
 tenant_desc_attribute = desc
 tenant_enabled_attribute = enabled
 tenant_attribute_ignore =
 tenant_allow_create = True
 tenant_allow_update = True
 tenant_allow_delete = True
 tenant_enabled_emulation = False
 tenant_enabled_emulation_dn =

 role_tree_dn = ou=Roles,dc=example,dc=com
 role_filter =
 role_objectclass = organizationalRole
 role_id_attribute = cn
 role_name_attribute = ou
 role_member_attribute = roleOccupant
 role_attribute_ignore =
 role_allow_create = True
 role_allow_update = True
 role_allow_delete = True

 group_tree_dn =
 group_filter =
 group_objectclass = groupOfNames
 group_id_attribute = cn
 group_name_attribute = ou
 group_member_attribute = member
 group_desc_attribute = desc
 group_attribute_ignore =
 group_allow_create = True
 group_allow_update = True
 group_allow_delete = True

I only need to configure access through the dashboard.

Can anyone give me an example of the steps required.