LDAP settings not working for CollabNet Subversion server

Hi there

We are trying to setup a new Subversion server from CollabNet.

In the Server configuration under Authorization the LDAP setup is configured.

LDAP Security Level:   NONE
LDAP Server Host:    Our Domain Controller
LDAP Server Port:    389
LDAP Base DN:    CN=Schema,CN=Configuration,DC=corp,DC=yr,DC=com
LDAP Bind DN:      Domain\MyUserName
LDAP Bind Password:      MyPassword
LDAP Login Attribute:    Empty (uid will be matched)
LDAP Search Scope:   sub
LDAP Filter:    Empty
As I read the help and Collabnet ressources the above is setup correctly but I keep getting errors in the log that look like this:

[Mon May 02 21:25:15 2011] [info] [client] [11844] auth_ldap authenticate: user steensgaardm authentication failed; URI /svn/dev [LDAP: ldap_simple_bind_s() failed][Server Down]

I have tried to change the LDAP Base DN to include the entire domain name like this:

But then I get this error:

[Wed May 04 22:45:58 2011] [debug] mod_authnz_ldap.c(379): [client] [16924] auth_ldap authenticate: using URL ldap://cphebtdc01.emea.corp.yr.com/OU=EMEA-WUN-CPH-EBT,OU=EMEA-WUN-CPH,OU=EMEA-WUN,DC=emea,DC=corp,DC=yr,DC=com?uid?sub

[Wed May 04 22:45:58 2011] [info] [client] [16924] auth_ldap authenticate: user emea\\petersent authentication failed; URI /svn/ [User not found][No Such Object]

[Wed May 04 22:45:58 2011] [client] user emea\\petersent not found: /svn/

Any help would be greatly appreciated as I'm not what one might call well versed in the Intricasies of LDAP :)

Best Regards
Who is Participating?
You use the AD schema partition as an LDAP Base DN, this looks strange, please try again with you Domain DN as the "LDAP Base DN".....and continue to use "MyDomain\MyUser" as the "LDAP Bind DN". MYbe it should be a good idead to set a default LDAP filter also.. :

LDAP Base DN:    DC=corp,DC=yr,DC=com
LDAP Bind DN:      Domain\MyUserName
LDAP Filter:    (objectClass=*)

another additional idea: use the AD logon name attribute for the "LDAP Login Attribute":

DAP Login Attribute:    sAMAccountName

hope that helps
PanthomAuthor Commented:
DAP Login Attribute:    sAMAccountName

did the trick :)
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.