-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
use LDAP privileged bind in account creation #142
Labels
Comments
Also, it would be nice to supply these credentials to the check script so
we can continue to see affiliations there. We would want to make them at
least staff-only though.
|
partially addressed in ocf/utils#86 |
I think we can close this. |
This isn't implemented. We should probably do it soon though... |
I can't read, my bad. |
Merged
Resolved with #157 |
Why was this re-opened? |
My PR for this needed to be reverted back in Feb. I'm working on a PR that hopefully doesn't break other services so just keeping it open to indicate it hasn't been resolved yet. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
in #140 we had to remove verification against the berkeleyEduAffiliation LDAP attribute because anonymous access was going away. Now, we've received a privileged bind to access the attribute again, so we should re-add support for verifying member affiliations with the privileged bind.
The text was updated successfully, but these errors were encountered: