Commit 04a4d895 authored by Ing. František DVOŘÁK's avatar Ing. František DVOŘÁK
Browse files

LDAP attribute options: fix operational attributes usage during create (Active Directory password)

parent 0ebdcd9b
Pipeline #1754 passed with stage
in 1 minute and 40 seconds
......@@ -867,7 +867,10 @@ public abstract class AbstractLdapConnector<C extends AbstractLdapConfiguration>
List<Value> ldapValues = shcemaTranslator.toLdapValues(ldapAttributeType, connIdAttrValues);
// Do NOT set attributeType here. The attributeType may not match the type of the value.
LOG.info("create: connIdAttr.name {0}, ldapAttributeType.name {1}", connIdAttr.getName(), ldapAttributeType.getName());
entry.put(connIdAttr.getName(), ldapValues.toArray(new Value[ldapValues.size()]));
if (schemaTranslator.isTaggedAttribute(connIdAttr.getName()))
entry.put(connIdAttr.getName(), ldapValues.toArray(new Value[ldapValues.size()]));
else
entry.put(ldapAttributeType.getName(), ldapValues.toArray(new Value[ldapValues.size()]));
// no simple way how to check if he attribute was added. It may end up with ERR_04451. So let's just
// hope that it worked well. It should - unless there is a connector bug.
}
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment