Bind with a unique combination of attribute-value

You can use any unique attribute-value pair and password, instead of the distinguished name (DN) and password, to bind to a directory server.

This feature is similar to the feature explained in the earlier section named Bind with a unique attribute value.

Restriction: A bind operation with a unique attribute-value pair is not supported by proxy servers.

To use an attribute-value pair and password in bind operations, you must:

  • Identify an attribute-value pair that is unique in the directory server instance.
  • Configure the ibm-slapdBindWithUniqueAttrsEnabled attribute under the cn=Configuration entry and set its value to "true".
  • Restart the server and the administration server
Note: Do not use the attribute-value pairs for the bind operation in the following situations:
  • An attribute that has the = character in the attribute value.
  • An encrypted attribute.
  • An attribute-value pair that is same as the administrative DN configured for a Local administrative group member. For example, if there is a Local administrative group member with administrative DN cn=lagm1, and if there is a user in the directory server that has the value of cn as "lagm1", then the bind operation with a combination of cn=lagm1 and the password of the user in the directory server fails because the server tries to verify the user credentials with the credentials of the Local administrative group member.

The following example shows the cn=Configuration entry with the ibm-slapdBindWithUniqueAttrsEnabled attribute:

dn: cn=Configuration
cn: Configuration
ibm-slapdAdminDN: cn=root
ibm-slapdAdminGroupEnabled: true
ibm-slapdAdminPW: {AES256}0iBLFmJJXwLM5eocBxeJZw==
...
...
ibm-slapdTimeLimit: 900
ibm-slapdTraceMessageLevel: 0xFFFF
ibm-slapdTraceMessageLog: /home/dsrdbm01/idsslapd-dsrdbm01/logs/traceibmslapd.log
ibm-slapdBindWithUniqueAttrsEnabled: true
ibm-slapdVersion: 6.4
objectclass: top
objectclass: ibm-slapdConfigEntry
objectclass: ibm-slapdTop

Error codes

When you use an attribute-value pair for bind operations, the directory server generates an LDAP_INVALID_CREDENTIALS error for the following reasons:

  • The attribute-value pair that is used for the bind operation is not associated with any entry.
  • The password is incorrect.
  • The attribute-value pair is not unique or multiple entries are associated with the attribute-value pair.

The error messages are also recorded in the ibmslapd.log file.

If a directory server generates an error for any other conditions, the server returns the LDAP_INVALID_CREDENTIALS error code. If you activate the server trace, then the error messages are also logged in the traceibmslapd.log file.

Audit log entries for bind with a unique attribute value

For security purposes, you can enable the audit log to record all failed and successful operations against a directory server. The server records the following attributes in the audit log file for operations that result in a bind against the server with a unique attribute-value pair:

  • bindDN: unique_attr=attr_value
  • name: DN_entry_value

The bindDN entry records the unique_attr=attr_value, which was used to bind against the server. The name entry records the DN entry that is associated with the unique attribute-value pair. The following example shows the audit record with the values:

AuditV3--2013-05-20-21:43:38.903+5:30--V3 Bind--bindDN: mail=al.garcia@sample.com
--client: 127.0.0.1:17042--connectionID: 2--received: 2013-05-20-21:43:38.881+5:30
--Success
controlType: 1.3.6.1.4.1.42.2.27.8.5.1
criticality: false
name: cn=Al Garcia, ou=Home Entertainment, ou=Austin, o=sample
authenticationChoice: simple
AuditV3--2013-05-20-21:43:38.961+5:30--V3 Search--bindDN: al.garcia@sample.com
--client: 127.0.0.1:17042--connectionID: 2--received: 2013-05-20-21:43:38.896+5:30
--Success
controlType: 1.3.6.1.4.1.42.2.27.8.5.1
criticality: false
base: o=sample
scope: wholeSubtree
derefAliases: neverDerefAliases
typesOnly: false
filter: (objectclass=*)
numberOfEntriesReturned: 2
AuditV3--2013-05-20-21:43:38.962+5:30--V3 Unbind--bindDN: mail=al.garcia@sample.com
--client: 127.0.0.1:17042--connectionID: 2--received: 2013-05-20-21:43:38.962+5:30
--Success

Bind with a unique combination of attribute-value for pass-through authentication

You can use any unique attribute-value pair to authenticate against an authentication server. Instead of the DN value and password, use a unique attribute-value pair and password for bind operations.

If the user entry is not available on the authentication server, the server generates an error. For pass-through authentication with a unique attribute value and password, the entry must be available on the authenticating server.