You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
tps-authenticator cli is not able to add authenticator source under which we
can add properties.
example : to add properties under authenticator "ldap2",ldap2 should be created
like we did in TPS UI.
Example :
pki -d . -n "PKI Administrator for os1.phx2.redhat.com" -c redhat
tps-authenticator-add --input input
IllegalArgumentException: Arguments must not be null
Steps to Reproduce:
1. Run command:
pki -d . -n "PKI Administrator for os1.phx2.redhat.com" -c redhat
tps-authenticator-add --input input
Actual results:
IllegalArgumentException: Arguments must not be null
}}
Expected results:
Authenticator i.e LDAP here should get added.
Additional info:
input file :
auths.instance.ldap2.authCredName=uid
auths.instance.ldap2.externalReg.certs.recoverAttributeName=certsToAdd
auths.instance.ldap2.externalReg.cuidAttributeName=tokenCUID
auths.instance.ldap2.externalReg.tokenTypeAttributeName=tokenType
auths.instance.ldap2.ldap.basedn=ou=People,dc=example,dc=org
auths.instance.ldap2.ldap.ldapauth.authtype=BasicAuth
auths.instance.ldap2.ldap.ldapauth.clientCertNickname=subsystemCert cert-Foobar
auths.instance.ldap2.ldap.ldapconn.host=geetikakay-local.os1.phx2.redhat.com
auths.instance.ldap2.ldap.ldapconn.port=1389
auths.instance.ldap2.ldap.ldapconn.secureConn=False
auths.instance.ldap2.ldap.ldapconn.version=3
auths.instance.ldap2.ldap.maxConns=15
auths.instance.ldap2.ldapStringAttributes=mail,cn,uid
auths.instance.ldap2.ldapStringAttributes._000=################################
#
auths.instance.ldap2.ldapStringAttributes._001=# For isExternalReg
auths.instance.ldap2.ldapStringAttributes._002=# attributes will be available
as
auths.instance.ldap2.ldapStringAttributes._003=# $$
auths.instance.ldap2.ldapStringAttributes._004=# attributes example:
auths.instance.ldap2.ldapStringAttributes._005=#mail,cn,uid,edipi,pcc,firstname
,lastname,exec-edipi,exec-pcc,exec-mail,certsToAdd,tokenCUID,tokenType
auths.instance.ldap2.ldapStringAttributes._006=################################
#
auths.instance.ldap2.pluginName=UidPwdDirAuth
auths.instance.ldap2.ui.description.en=This authenticates user against the LDAP
directory.
auths.instance.ldap2.ui.id.PASSWORD.credMap.authCred=pwd
auths.instance.ldap2.ui.id.PASSWORD.credMap.msgCred.extlogin=PASSWORD
auths.instance.ldap2.ui.id.PASSWORD.credMap.msgCred.login=password
auths.instance.ldap2.ui.id.PASSWORD.description.en=LDAP Password
auths.instance.ldap2.ui.id.PASSWORD.name.en=LDAP Password
auths.instance.ldap2.ui.id.UID.credMap.authCred=uid
auths.instance.ldap2.ui.id.UID.credMap.msgCred.extlogin=UID
auths.instance.ldap2.ui.id.UID.credMap.msgCred.login=screen_name
auths.instance.ldap2.ui.id.UID.description.en=LDAP User ID
auths.instance.ldap2.ui.id.UID.name.en=LDAP User ID
auths.instance.ldap2.ui.retries=3
auths.instance.ldap2.ui.title.en=LDAP Authentication
```
The text was updated successfully, but these errors were encountered:
This issue was migrated from Pagure Issue #2297. Originally filed by gkapoor (@geetikakay) on 2016-04-25 20:24:14:
tps-authenticator cli is not able to add authenticator source under which we
can add properties.
example : to add properties under authenticator "ldap2",ldap2 should be created
like we did in TPS UI.
Example :
pki -d . -n "PKI Administrator for os1.phx2.redhat.com" -c redhat
tps-authenticator-add --input input
IllegalArgumentException: Arguments must not be null
Steps to Reproduce:
Actual results:
Authenticator i.e LDAP here should get added.
input file :
auths.instance.ldap2.authCredName=uid auths.instance.ldap2.externalReg.certs.recoverAttributeName=certsToAdd auths.instance.ldap2.externalReg.cuidAttributeName=tokenCUID auths.instance.ldap2.externalReg.tokenTypeAttributeName=tokenType auths.instance.ldap2.ldap.basedn=ou=People,dc=example,dc=org auths.instance.ldap2.ldap.ldapauth.authtype=BasicAuth auths.instance.ldap2.ldap.ldapauth.clientCertNickname=subsystemCert cert-Foobar auths.instance.ldap2.ldap.ldapconn.host=geetikakay-local.os1.phx2.redhat.com auths.instance.ldap2.ldap.ldapconn.port=1389 auths.instance.ldap2.ldap.ldapconn.secureConn=False auths.instance.ldap2.ldap.ldapconn.version=3 auths.instance.ldap2.ldap.maxConns=15 auths.instance.ldap2.ldapStringAttributes=mail,cn,uid auths.instance.ldap2.ldapStringAttributes._000=################################ # auths.instance.ldap2.ldapStringAttributes._001=# For isExternalReg auths.instance.ldap2.ldapStringAttributes._002=# attributes will be available as auths.instance.ldap2.ldapStringAttributes._003=# $$ auths.instance.ldap2.ldapStringAttributes._004=# attributes example: auths.instance.ldap2.ldapStringAttributes._005=#mail,cn,uid,edipi,pcc,firstname ,lastname,exec-edipi,exec-pcc,exec-mail,certsToAdd,tokenCUID,tokenType auths.instance.ldap2.ldapStringAttributes._006=################################ # auths.instance.ldap2.pluginName=UidPwdDirAuth auths.instance.ldap2.ui.description.en=This authenticates user against the LDAP directory. auths.instance.ldap2.ui.id.PASSWORD.credMap.authCred=pwd auths.instance.ldap2.ui.id.PASSWORD.credMap.msgCred.extlogin=PASSWORD auths.instance.ldap2.ui.id.PASSWORD.credMap.msgCred.login=password auths.instance.ldap2.ui.id.PASSWORD.description.en=LDAP Password auths.instance.ldap2.ui.id.PASSWORD.name.en=LDAP Password auths.instance.ldap2.ui.id.UID.credMap.authCred=uid auths.instance.ldap2.ui.id.UID.credMap.msgCred.extlogin=UID auths.instance.ldap2.ui.id.UID.credMap.msgCred.login=screen_name auths.instance.ldap2.ui.id.UID.description.en=LDAP User ID auths.instance.ldap2.ui.id.UID.name.en=LDAP User ID auths.instance.ldap2.ui.retries=3 auths.instance.ldap2.ui.title.en=LDAP Authentication ```The text was updated successfully, but these errors were encountered: