39 lines
1.0 KiB
Python
39 lines
1.0 KiB
Python
# How to bind to MS AD with python-ldap and various methods
|
|
|
|
import ldap,ldap.sasl
|
|
|
|
ldap_uri = "ldap://dc1.example.com"
|
|
dn = "CN=Anna Blume,CN=Users,DC=addomain,DC=example,DC=com"
|
|
sAMAccountName = "ABlume"
|
|
userPrincipalName = "ablume@addomain.example.com"
|
|
password = 'testsecret'
|
|
|
|
trace_level = 2
|
|
|
|
l = ldap.initialize(ldap_uri,trace_level=trace_level)
|
|
|
|
# Normal LDAPv3 compliant simple bind
|
|
l.simple_bind_s(dn,password)
|
|
|
|
# This is AD-specific and not LDAPv3 compliant
|
|
l.simple_bind_s(userPrincipalName,password)
|
|
|
|
# This is AD-specific and not LDAPv3 compliant
|
|
l.simple_bind_s(userPrincipalName,password)
|
|
|
|
# SASL bind with mech DIGEST-MD5 with sAMAccountName as SASL user name
|
|
sasl_auth = ldap.sasl.sasl(
|
|
{
|
|
ldap.sasl.CB_AUTHNAME:sAMAccountName,
|
|
ldap.sasl.CB_PASS :password,
|
|
},
|
|
'DIGEST-MD5'
|
|
)
|
|
l.sasl_interactive_bind_s("", sasl_auth)
|
|
|
|
# SASL bind with mech GSSAPI
|
|
# with the help of Kerberos V TGT obtained before with command
|
|
# kinit ablume@ADDOMAIN.EXAMPLE.COM
|
|
sasl_auth = ldap.sasl.sasl({},'GSSAPI')
|
|
l.sasl_interactive_bind_s("", sasl_auth)
|