public class ActiveDirectoryDomain extends AbstractDescribableImpl<ActiveDirectoryDomain> implements Serializable
Modifier and Type | Class and Description |
---|---|
static class |
ActiveDirectoryDomain.Catalog |
static class |
ActiveDirectoryDomain.DescriptorImpl |
Modifier and Type | Field and Description |
---|---|
String |
bindName
If non-null, use this name and password to bind to LDAP to obtain the DN
of the user trying to login.
|
Secret |
bindPassword |
String |
name
Domain name
|
String |
servers
If non-null, Jenkins will try to connect at this server at the first priority, before falling back to
discovered DNS servers.
|
String |
site
Active directory site (which specifies the physical concentration of the
servers), if any.
|
protected hudson.plugins.active_directory.TlsConfiguration |
tlsConfiguration
Selects the SSL strategy to follow on the TLS connections
|
Constructor and Description |
---|
ActiveDirectoryDomain(String name,
String servers) |
ActiveDirectoryDomain(String name,
String servers,
String site,
String bindName,
String bindPassword)
Deprecated.
|
ActiveDirectoryDomain(String name,
String servers,
String site,
String bindName,
String bindPassword,
hudson.plugins.active_directory.TlsConfiguration tlsConfiguration) |
Modifier and Type | Method and Description |
---|---|
DirContext |
createDNSLookupContext()
Creates
DirContext for accessing DNS. |
static String |
fixEmpty(String s)
Convert empty string to null.
|
String |
getBindName() |
Secret |
getBindPassword() |
String |
getName() |
Attribute |
getRecordFromDomain()
Get the record from a domain
|
String |
getServers() |
Attribute |
getServersOnCatalog(String catalog)
Get the list of servers which compose the
ActiveDirectoryDomain.Catalog
The ActiveDirectoryDomain.Catalog can be gc or ldap. |
String |
getSite() |
hudson.plugins.active_directory.TlsConfiguration |
getTlsConfiguration() |
getDescriptor
public String name
When this plugin is used on Windows, this field is null, and we use ADSI and ADO through com4j to perform authentication.
OTOH, when this plugin runs on non-Windows, this field must be non-null, and we'll use LDAP for authentication.
public String servers
public String site
On Windows, I'm assuming ADSI takes care of everything automatically.
public String bindName
public Secret bindPassword
protected hudson.plugins.active_directory.TlsConfiguration tlsConfiguration
Even if we are not using any of the TLS ports (3269/636) the plugin will try to establish a TLS channel using startTLS. Because of this, we need to be able to specify the SSL strategy on the plugin
For the moment there are two possible values: trustAllCertificates and trustStore.
@Deprecated public ActiveDirectoryDomain(String name, String servers, String site, String bindName, String bindPassword)
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public String getName()
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public String getServers()
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public String getBindName()
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public Secret getBindPassword()
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public String getSite()
@Restricted(value=org.kohsuke.accmod.restrictions.NoExternalUse.class) public hudson.plugins.active_directory.TlsConfiguration getTlsConfiguration()
public Attribute getRecordFromDomain()
public DirContext createDNSLookupContext() throws NamingException
DirContext
for accessing DNS.NamingException
public Attribute getServersOnCatalog(String catalog)
ActiveDirectoryDomain.Catalog
The ActiveDirectoryDomain.Catalog
can be gc or ldap.ActiveDirectoryDomain.Catalog
Copyright © 2016–2021. All rights reserved.