经过身份验证的 SSL LDAP 连接 SSL 证书与反向 DNS 不匹配
为服务器和身份验证信息设置一些常量。假设有 LDAPv3,但很容易改变它。
// Authentication, and the name of the server.
private const string LDAPUser = "cn=example:app:mygroup:accts,ou=Applications,dc=example,dc=com";
private readonly char[] password = { 'p', 'a', 's', 's', 'w', 'o', 'r', 'd' };
private const string TargetServer = "ldap.example.com";
// Specific to your company. Might start "cn=manager" instead of "ou=people", for example.
private const string CompanyDN = "ou=people,dc=example,dc=com";
实际上创建了三个部分的连接:LdapDirectoryIdentifier(服务器)和 NetworkCredentials。
// Configure server and port. LDAP w/ SSL, aka LDAPS, uses port 636.
// If you don't have SSL, don't give it the SSL port.
LdapDirectoryIdentifier identifier = new LdapDirectoryIdentifier(TargetServer, 636);
// Configure network credentials (userid and password)
var secureString = new SecureString();
foreach (var character in password)
secureString.AppendChar(character);
NetworkCredential creds = new NetworkCredential(LDAPUser, secureString);
// Actually create the connection
LdapConnection connection = new LdapConnection(identifier, creds)
{
AuthType = AuthType.Basic,
SessionOptions =
{
ProtocolVersion = 3,
SecureSocketLayer = true
}
};
// Override SChannel reverse DNS lookup.
// This gets us past the "The LDAP server is unavailable." exception
// Could be
// connection.SessionOptions.VerifyServerCertificate += { return true; };
// but some certificate validation is probably good.
connection.SessionOptions.VerifyServerCertificate +=
(sender, certificate) => certificate.Subject.Contains(string.Format("CN={0},", TargetServer));
使用 LDAP 服务器,例如,通过 userid 搜索所有 objectClass 值的某个人。objectClass 用于演示复合搜索:&符号是两个查询子句的布尔和运算符。
SearchRequest searchRequest = new SearchRequest(
CompanyDN,
string.Format((&(objectClass=*)(uid={0})), uid),
SearchScope.Subtree,
null
);
// Look at your results
foreach (SearchResultEntry entry in searchResponse.Entries) {
// do something
}