Package hudson.plugins.active_directory
Class ActiveDirectorySecurityRealm.DescriptorImpl
java.lang.Object
hudson.model.Descriptor<SecurityRealm>
hudson.plugins.active_directory.ActiveDirectorySecurityRealm.DescriptorImpl
- Enclosing class:
- ActiveDirectorySecurityRealm
@Extension
public static final class ActiveDirectorySecurityRealm.DescriptorImpl
extends Descriptor<SecurityRealm>
-
Nested Class Summary
Nested classes/interfaces inherited from class hudson.model.Descriptor
Descriptor.FormException, Descriptor.PropertyType, Descriptor.Self
-
Field Summary
Fields inherited from class hudson.model.Descriptor
clazz
-
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionbind
(String principalName, String password, List<SocketInfo> ldapServers) Deprecated.bind
(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props) Deprecated.bind
(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props, TlsConfiguration tlsConfiguration) Deprecated.bind
(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props, TlsConfiguration tlsConfiguration, boolean requireTLS) Deprecated.bind
(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props, TlsConfiguration tlsConfiguration, boolean requireTLS, boolean startTls) Binds to the server using the specified username/password.boolean
If true, we can do ADSI/COM based look up that's far more reliable.doCheckRequireTLS
(boolean requireTLS, boolean startTls) doCheckStartTls
(boolean requireTLS, boolean startTls) protected static boolean
isTrustAllCertificatesEnabled
(TlsConfiguration tlsConfiguration) obtainLDAPServer
(ActiveDirectoryDomain activeDirectoryDomain) obtainLDAPServer
(String domainName, String site, String preferredServer) Deprecated.obtainLDAPServer
(DirContext ictx, String domainName, String site, String preferredServers) Deprecated.see obtainLDAPServer(DirContext, String, String, String, boolean)obtainLDAPServer
(DirContext ictx, String domainName, String site, String preferredServers, boolean useTLS) Use DNS and obtains the LDAP servers that we should try.Methods inherited from class hudson.model.Descriptor
addHelpFileRedirect, bindJSON, bindJSON, calcAutoCompleteSettings, calcFillSettings, configure, configure, configure, doHelp, doHelp, find, find, findByDescribableClassName, findById, getCategory, getCheckMethod, getCheckUrl, getConfigFile, getConfigPage, getCurrentDescriptorByNameUrl, getDescriptorFullUrl, getDescriptorUrl, getGlobalConfigPage, getGlobalPropertyType, getHelpFile, getHelpFile, getId, getJsonSafeClassName, getKlass, getPlugin, getPossibleViewNames, getPropertyType, getPropertyType, getPropertyTypeOrDie, getRequiredGlobalConfigPagePermission, getStaticHelpUrl, getStaticHelpUrl, getT, getViewPage, isInstance, isSubTypeOf, load, newInstance, newInstance, newInstance, newInstancesFromHeteroList, newInstancesFromHeteroList, newInstancesFromHeteroList, newInstancesFromHeteroList, save, self, toArray, toList, toMap
-
Constructor Details
-
DescriptorImpl
public DescriptorImpl()
-
-
Method Details
-
getDisplayName
- Overrides:
getDisplayName
in classDescriptor<SecurityRealm>
-
getHelpFile
- Overrides:
getHelpFile
in classDescriptor<SecurityRealm>
-
canDoNativeAuth
public boolean canDoNativeAuth()If true, we can do ADSI/COM based look up that's far more reliable. False if we need to do the authentication in pure Java viaActiveDirectoryUnixAuthenticationProvider
-
doFillSizeItems
-
doFillTtlItems
-
doFillGroupLookupStrategyItems
-
doCheckRequireTLS
public FormValidation doCheckRequireTLS(@QueryParameter boolean requireTLS, @QueryParameter boolean startTls) -
doCheckStartTls
public FormValidation doCheckStartTls(@QueryParameter boolean requireTLS, @QueryParameter boolean startTls) -
isTrustAllCertificatesEnabled
-
bind
@Deprecated public DirContext bind(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props) throws NamingExceptionDeprecated.- Throws:
NamingException
-
bind
@Deprecated public DirContext bind(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props, TlsConfiguration tlsConfiguration) throws NamingExceptionDeprecated.- Throws:
NamingException
-
bind
@Deprecated public DirContext bind(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props, TlsConfiguration tlsConfiguration, boolean requireTLS) throws NamingExceptionDeprecated.- Throws:
NamingException
-
bind
public DirContext bind(String principalName, String password, List<SocketInfo> ldapServers, Hashtable<String, String> props, TlsConfiguration tlsConfiguration, boolean requireTLS, boolean startTls) throws NamingExceptionBinds to the server using the specified username/password.In a real deployment, often there are servers that don't respond or otherwise broken, so try all the servers.
- Throws:
NamingException
-
bind
@Deprecated public DirContext bind(String principalName, String password, List<SocketInfo> ldapServers) throws NamingException Deprecated.Binds to the server using the specified username/password.In a real deployment, often there are servers that don't respond or otherwise broken, so try all the servers.
- Throws:
NamingException
-
obtainLDAPServer
@Deprecated public List<SocketInfo> obtainLDAPServer(String domainName, String site, String preferredServer) throws NamingException Deprecated.- Throws:
NamingException
-
obtainLDAPServer
public List<SocketInfo> obtainLDAPServer(ActiveDirectoryDomain activeDirectoryDomain) throws NamingException - Throws:
NamingException
-
obtainLDAPServer
@Deprecated public List<SocketInfo> obtainLDAPServer(DirContext ictx, String domainName, String site, String preferredServers) throws NamingException Deprecated.see obtainLDAPServer(DirContext, String, String, String, boolean)- Throws:
NamingException
-
obtainLDAPServer
public List<SocketInfo> obtainLDAPServer(DirContext ictx, String domainName, String site, String preferredServers, boolean useTLS) throws NamingException Use DNS and obtains the LDAP servers that we should try.- Parameters:
preferredServers
- If non-null, these servers are reported instead of doing the discovery. In previous versions, this was simply added on top of the auto-discovered list, but this option is useful when you have many domain controllers (because a single mistyped password can cause an authentication attempt with every listed server, which can lock the user out!) This also puts this feature in alignment withActiveDirectorySecurityRealm.DOMAIN_CONTROLLERS
, which seems to indicate that there are users who prefer this behaviour.useTLS
-true
if we should use ldaps.- Returns:
- A list with at least one item.
- Throws:
NamingException
-