- Community Home
- >
- Networking
- >
- Security e-Series
- >
- Authenticating MFPs against Active Directory - Hav...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-14-2014 01:45 PM
07-14-2014 01:45 PM
Authenticating MFPs against Active Directory - Having problems.
I have been scavenging for answers for a while on this, and am generating this question because I haven't found anything that works.
I am looking to set up an assortment of MFPs, running a mixture of older firmware and FutureSmart firmware, and I am having problems.
I am in a Windows domain enviroment, and my goal should be simple. I need to set up a number of MFPs to autheiticate against Active directory, using the domain User ID and password.
While I would have thought this to be simple, it is proving anything but.
I am using LDAP autheitication for this task.
It appears that the MFPs insist on building a Distinguished Name. They do this by taking the supplied ID and building it into the leading CN element of a DN string. The problem is that over the years, various iterations of Windows have changed the defaults in creating users. We have a mix of IDs where the CN is the samne as the User ID, and others where the CN is the same as the display name. The result is that the DN of any given ID uses one element or the other depending on the age of the account. What I really want to accomplish is to have the entered credentials matched against the sAMAccountName, have the Display Name and e-mail retreived, and used as appropriate for the function in use at the time.
The best I have managed so far is to use CN as the Bind prefix on the User credentials, which works if the CN is the same as the sAMAccountName. These IDs can authenticate, others cannot. Even when the long form of the name name is given as indicated in the DN field of the AD record, the authentication fails.
Mass editing of the AD records is not really practiical. I would be interested in suggestions as to how the User ID can be made to work across both old and new entries.
Thanks for any ideas.
- Tags:
- LDAP