views:

254

answers:

0

Hi!

I try to use ASP.Net's MembershipProvider to give access only to certain users. This is backed up by an ADAM instance.

I use some test-code which runs just fine:

public static DataTable getADValuesByParameter(string strFilter, string strLDAPUser, string strLDAPPath, string strLDAPPWD, string strLDAPProperties)
        {
            DataTable functionReturnValue = default(DataTable);
            string[] arrLDAP = null;
            DirectoryEntry rootEntry = new DirectoryEntry();
            DirectorySearcher searcher = new DirectorySearcher();
            SearchResultCollection results = default(SearchResultCollection);
            DataTable dtExchangeUserData = new DataTable();
            arrLDAP = strLDAPProperties.Split(new char[] { ',' });
            rootEntry.Path = strLDAPPath;
            rootEntry.Username = strLDAPUser;
            rootEntry.Password = strLDAPPWD;
            rootEntry.AuthenticationType = AuthenticationTypes.Secure;

            searcher.SearchRoot = rootEntry;
            searcher.SearchScope = SearchScope.Subtree;
            searcher.Filter = strFilter;
            searcher.PropertiesToLoad.AddRange(arrLDAP);

            //var value = rootEntry.NativeObject;

            results = searcher.FindAll();
            Int16 si = default(Int16);
            foreach (SearchResult result in results)
            {
                si = 0;
                object[] arrKeyValue = new object[result.Properties.Count - 1];
                // -2 weil property "adspath" nicht dazu gehört, und .count -1 weil 0 basierendes array
                if ((result != null))
                {
                    System.Collections.IEnumerator myEnumerator = arrLDAP.GetEnumerator();
                    while (myEnumerator.MoveNext())
                    {
                        foreach (string Key in result.Properties.PropertyNames)
                        {
                            if (Key != "adspath")
                            {
                                if (Key.Equals(((string)myEnumerator.Current).ToLower()))
                                {
                                    if (dtExchangeUserData.Columns[Key] == null)
                                        dtExchangeUserData.Columns.Add(Key);
                                    if (Key.Equals("objectguid"))
                                    {
                                        arrKeyValue[si] = new Guid(((byte[])result.Properties[Key][0]));
                                    }
                                    else
                                    {
                                        arrKeyValue[si] = result.Properties[Key][0].ToString();
                                    }
                                    si++;
                                }
                            }
                        }
                    }
                    if (arrKeyValue.Length > 0)
                        dtExchangeUserData.Rows.Add(arrKeyValue);
                }
            }

            functionReturnValue = dtExchangeUserData;
            dtExchangeUserData.Dispose();
            rootEntry.Close();
            rootEntry.Dispose();
            return functionReturnValue;
        }

Here, I query the ADAM manually. Although the code is badly written, it works. Note how I use "AuthenticationTypes.Secure".

Now, when I try to do the same thing (same connectionPath, username, password and so on) with the ActiveDirectoryMembershipProvider, it gives me (roughly translated from German):

ConfigurationErrorsException: Can't establish a secure connection over SSL.

This happens when I call

Membership.ValidateUser()

Here are the relevant parts from the Web.config file:

<connectionStrings>
<add name="ADConnectionString" connectionString="LDAP://server.com/OU=users,DC=test,DC=adam"/>
</connectionStrings>
<authentication mode="Forms" >
      <forms loginUrl="~/Login.aspx/Test/" timeout="2880" />
    </authentication>
    <authorization>
      <deny users ="?" />
    </authorization>

    <!--<identity impersonate="true" />-->

    <trust level="Full" />

    <membership defaultProvider="MyMembershipProvider">
      <providers>
        <add name="MyMembershipProvider"
              type="System.Web.Security.ActiveDirectoryMembershipProvider, System.Web, Version=2.0.0.0,Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a"
              connectionStringName="ADConnectionString"
              connectionUsername="[domain]\[user]"
              connectionPassword="[password]"
              connectionProtection="Secure"
              enableSearchMethods="true"
          />
        </providers>
    </membership>

It doesn't matter whether I use impersonation or not (to be honest, I don't really know what it does anyway). Trust-level doesn't change anything either.

When I use connectionProtection="None" instead, it gives me (again translated) "Wrong username or password". I get the same error when I use "AuthenticationTypes.None" in the manual example.

What am I doing wrong?

Thanks for your time...