Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Password (not) null issue on password reset #70

Open
cheesegrits opened this issue May 18, 2018 · 0 comments
Open

Password (not) null issue on password reset #70

cheesegrits opened this issue May 18, 2018 · 0 comments

Comments

@cheesegrits
Copy link

I know that @ShMaunder has moved on, but I'm hoping someone else might have a solution for this one.

I use the "Password null" feature to force authentication against LDAP on every login. This works great on initial user creation. The password field in the J! users table is null, so authentication gets punted to LDAP.

The problem being that if the user ever changes their password in J!, even if the LDAP password plugin is enabled, the new password then gets written out to J!'s user table, and from that point on, the user is then authenticating against J!, not LDAP. Which means that if their account is removed in LDAP, they can still log in to J!.

The client I'm implementing this for has a (very) rigid requirement that if the account is suspended in LDAP, they should no longer be able to login to J!. I'm working round it atm by blocking access to the J! profile so users can't (easily) change their password, but I'd prefer a more robust solution.

I've forked this repo and am looking at a couple of programmatic solutions, nulling the J! password in the LDAP code. But I'm hoping I've just missed some obvious solution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant