Skip to content

Conversation

@pierre-lehnen-rc
Copy link
Contributor

Closes #17561

This PR adds a setting to determine if users should be enabled/disabled based on the LDAP status. It also fixes an issue where enterprise code was not properly validating if a license was active and causing some ldap code to be run on the community edition.

@@ -10,4 +8,4 @@ callbacks.add('ldap.beforeSearchAll', (searchParams) => {
options.attributes.push('pwdAccountLockedTime');
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It should be considered that microsoft active directory uses User-Account-Control Attribute Flags https://ldapwiki.com/wiki/User-Account-Control%20Attribute to control locked out/disabled accounts

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @bbrauns but the code doesn't support AD yet, would you mind to contribute this improvement?

@pierre-lehnen-rc pierre-lehnen-rc added this to the 3.4.0 milestone May 27, 2020
@rodrigok rodrigok self-assigned this Jun 19, 2020
@rodrigok rodrigok merged commit 261b0aa into develop Jun 19, 2020
@rodrigok rodrigok deleted the fix.ldap-sync-user-state branch June 19, 2020 17:12
@sampaiodiego sampaiodiego mentioned this pull request Jun 30, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[BUG] Deactivated users gets activated after Background LDAP Sync

4 participants