Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 14 Next »

The core UH LDAP server is ldap1.its.hawaii.edu and is based on the uhEduPerson schema.

The current LDAP will be retired


The current LDAP server will be retired January 21, 2014. New services should utilize our Next Generation LDAP (see below).

Next General LDAP


The next generation of our LDAP service is now in Production. Please see below for details:

Our core UH LDAP service currently has data in three branches:

  • ou=people,dc=hawaii,dc=edu
  • ou=misc,dc=hawaii,dc=edu
    • Departmental/ Group UH Usernames
    • Visiting individuals who have have been granted the ability to access the Internet from our campus(es).
  • ou=dept_listings,dc=hawaii,dc=edu
    • Department listings, primarily used for printing the University Phone Directory.

Accessing LDAP

LDAP Generation

host

port

comments

(tick) Next Generation LDAP, Productionldap.hawaii.edu389only for STARTTLS, clear binds are rejected, a Special DN is required
(tick) Next Generation LDAP, Testldap-test.hawaii.edu389only for STARTTLS, clear binds are rejected, a Special DN is required
(minus) Older, Slated for Retirement

ldap1.its.hawaii.edu

389

data goes over cleartext, do not provide any passwords when you connect

(minus) Older, Slated for Retirement

ldap1.its.hawaii.edu

636

LDAPS, encrypted, always use this when providing a password

  • Connecting to LDAP is referred to as binding.
  • You can bind to LDAP anonymously (without using any credentials)
    • This only gets you public information for faculty and staff. No students.
    • This is the only time you should connect in cleartext to port 389
  • You must bind to our Next Generation LDAP using a special DN
    • You must request a special DN in order to bind per UH Data Governance policies.
    • (warning) UNIX LDAP commands (e.g. ldapsearch) may not print an error message if you provide an incorrect special DN or password. These commands will continue working as if you had bound anonymously, and this is misleading. You may think you are using your special DN, but in reality, you are only able to get at public information (e.g. you can't search for students)

Using LDAP to verify a UH username and password

  • See LDAP Authentication
  • If you wish to limit use of your app to certain roles and/or campuses, you should retrieve the affiliations of the person associated with the authenticated username, and allow only those matching your criteria to pass through.

You should also look into CAS (Web Login Service) as an alternative to using LDAP for authentication.

Additional Information

  • No labels