-
Notifications
You must be signed in to change notification settings - Fork 96
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Directory Server should support LDAP aliases #152
Comments
Comment from rmeggins (@richm) at 2012-01-10 06:12:05 batch update moving tickets to future |
Comment from rmeggins (@richm) at 2012-08-14 19:56:22 set default ticket origin to Community |
Comment from nkinder (@nkinder) at 2012-08-28 04:14:32 Added initial screened field value. |
Comment from nkinder (@nkinder) at 2017-02-11 23:02:11 Metadata Update from @nkinder:
|
Comment from toni94 at 2020-02-25 17:56:15 Does the 389 Directory Server still not support LDAP aliases? |
Comment from mreynolds (@mreynolds389) at 2020-02-25 19:18:36
Correct, we still do not support aliases. There are no plans to add this functionality at this time. |
Comment from mreynolds (@mreynolds389) at 2020-02-25 19:18:36 Metadata Update from @mreynolds389:
|
Comment from toni94 at 2020-02-26 08:48:46 So you have been ignoring this feature since 2006? That's impressive :) I have to assume that with 389 Directory Server there is another way to achieve the same or similar functionality as LDAP aliases do, right? |
Comment from lkrispen (@elkris) at 2020-02-26 12:12:12
and looks like there was no real demand
we have smart referrals, which is probably not exactly what you want. But it could be a good starting point to manage aliases |
Comment from firstyear (@Firstyear) at 2020-02-27 04:29:06 Generally in these cases, I always ask "what are you trying to achieve". Sometimes there may be an easier or alternative method that doesn't involve new code/features. |
Comment from mreynolds (@mreynolds389) at 2020-03-25 17:01:21 Since there is no demand for this, we are going to close it out for now... |
Comment from mreynolds (@mreynolds389) at 2020-03-25 17:01:22 Metadata Update from @mreynolds389:
|
Hi, if anyone is interested, I've created a plugin which supports alias dereferencing during base lookups. It's here. |
We would need to test this of course, but would it be something you would allow us to add to the server code base? |
Sure! |
Part of the rfc is that aliases shouldn't have subordinate entries, is there a way we could enforce that? |
Not easily, not without doing additional internal searches. Personally I don't feel we have to be super strict with this. The RFC is somewhat vague to begin with, the reasoning for this "requirement" is not clear, and there is little demand for this feature. Thoughts? |
IMHO this kind of constraint (i.e which children entries could exist below a given parent entry) are supposed to be handled by the "DIT structure rules" (cf RFC4512, 4517 and X.501) but that is a part of the ldap RFC that is not implemented in ds389. So I would not bother about it until we support the DIT structure rules. (Should not be too complex as it is simply a test to do when adding a new entry, But I do not think that there is a real demand about it either. -;) |
Don't we have a numsubordinates attribute on entries? But yes, there would be extra work involved for this requirement, but it is part of the rfc. I'm not gonna lose sleep if we don't do it though either. |
Cloned from Pagure issue: https://pagure.io/389-ds-base/issue/152
https://bugzilla.redhat.com/show_bug.cgi?id=178898
The text was updated successfully, but these errors were encountered: