As I said in our IRC conversation, you should try to use ldapsearch
to make sure you have the correct (and expected configuration and to actually configure ChiliProject accordingly.
ChiliProject is going to basically run the following query (to be run on the terminal):
ldapsearch -h my.ladp.server -D "superuser" -W -b "dc=arex,dc=pl" '(&(objectClass=*)(uid=USERNAME))' uid sN givenName mail
This query includes the following variables which you have to adapt to your local needs:
my.ladp.server
: Servername of your LDAP server.
superuser
: Bind DN for an LDAP user being able to read the whole user database. You also need a password for that one.
dc=arex,dc=pl
: Base DN. Basically the root node of all your user objects in the LDAP.
uid
: The attribute on your user objects which stores the login
sN
: The attribute on your user objects which stores the last name
givenName
: The attribute on your user objects which stores the given (first) name
mail
: The attribute on your user objects which stores the email address
USERNAME
: The username of the user you try to login (i.e. the value of the uid
attribute of that user object).
If you have no idea about the attributes, you could use the following query to output the whole LDAP tree. But be careful, it will probably be a huge amount of data. You might want to additionally filter it.
ldapsearch -h my.ladp.server -D "superuser" -W -b "dc=arex,dc=pl" '(objectClass=*)'
[EDIT]
The attribute used for the login is not really standardized. OpenDS (and probably OpenLDAP) installations typically use the uid field. Windows AD uses the legacy sAMAccountName
attribute.