I am in the same boat.
1) DC login for the users.
2) SQL DB loging name and pass
3) MDaemon Username and Pass.
I am planning on testing CF to speak with our Domain Controller. If that works ok, I will begin testing the Mdaemon NT tool. This scares me because we need to have all of this as seamless as possibbl3, and MDaemon is not the best tool for this even with the add-on LDAP tool.
MDAEMON is easy to setup to talk to your Domain Controller.
You do Not need the LDAP tool if you already have a DC.
We set up a test MDAEMON server, imported the user from The IMPORT option in MDAEMON, and found that it works great.
It changes the users password to "\\servername"
When we changed the password in Active directory, MDAEMON authenticated fine. The trick is to have all your users set to have that as their password in MDAEMON. Now.. you may want to set password changes to NO to keep them from screwing things up.
If You disable a User in Active Dir, they cannot connect to their email beacuse their password cant authenticate. You just have to manaully setup each user (IMPORT) but thats it.
As for LDAP and CF....
Tried the Custom Tag ADAuthen from the new and "improved" Macromedia/Allaire site.
I set up a form that asked the Username and Password... It took several seconds and then reported the user was not valid. I think that tag timed out and returned the null value, so it never reaaly worked.
I am taking a break from it now, hoping someone out there has an answer... I will keep at it and let you know.
We have someone currently using Active Directory to authenticate using the Win2K unername for the Oracle Portal. It's not CF but it looks like if you could do it one way, you could do it with CF too.
I will check it out too. With ASP there is a third party COM object....but this isnt asp now is it? I an VERY interested in using AD domain Username / group to log into our CF INTRANET.....
I have been authenticating users via CFLDAP on AD for a while and it works great. Below is a snippet of what the code does. This was written by someone else who allows free distribution of the code. Let me know if anyone wants the files to be e-mailed to them.
...according to Microsoft, there is no
way to 'read' a password from Active Directory through
LDAP, only to add or modify one. However, for a user
to run a query against the Active Directory using the LDAP
protocol they must bind to it with a valid ID and password.
Knowning this, I created a CFLDAP query that uses a users
ID and password to attempt to bind to the Active Directory
and query it for their own username. If this is successful
then they must have provided valid credentials.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.