diff options
| author | James Elliott <james-d-elliott@users.noreply.github.com> | 2021-07-04 15:44:11 +1000 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2021-07-04 15:44:11 +1000 | 
| commit | 31c5c820f08b26cc9e4831efa02c13ca272e559d (patch) | |
| tree | 5605e4657c118ef771b55d69acfadc32d49231a8 /cmd/authelia | |
| parent | ef549f851d59ea5911b8ae76d4641c2c9eded6dc (diff) | |
refactor(authentication): log ldap warning on startup in rare condition (#2141)
This is so on startup administrators who have a LDAP server implementation that may not support password hashing by default are clearly warned. This only triggers if the disable password reset option is not enabled, we cannot find the extension OID for the Extended Password Modify Operation, and the implementation is not Active Directory. Active Directory has it's own method for this which doesn't advertise an OID.
Diffstat (limited to 'cmd/authelia')
| -rw-r--r-- | cmd/authelia/main.go | 2 | 
1 files changed, 1 insertions, 1 deletions
diff --git a/cmd/authelia/main.go b/cmd/authelia/main.go index 791457410..8b7879cd2 100644 --- a/cmd/authelia/main.go +++ b/cmd/authelia/main.go @@ -103,7 +103,7 @@ func startServer() {  	case config.AuthenticationBackend.File != nil:  		userProvider = authentication.NewFileUserProvider(config.AuthenticationBackend.File)  	case config.AuthenticationBackend.LDAP != nil: -		userProvider, err = authentication.NewLDAPUserProvider(*config.AuthenticationBackend.LDAP, autheliaCertPool) +		userProvider, err = authentication.NewLDAPUserProvider(config.AuthenticationBackend, autheliaCertPool)  		if err != nil {  			logger.Fatalf("Failed to Check LDAP Authentication Backend: %v", err)  		}  | 
