-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Checking Root Domain step fails #73
Comments
Did you ever find a resolution to this? We are having the same problem with DNN 9.08 and version 7 of the module. |
We never did. We spent a bunch of time trying to figure it out but never could even get an idea of what was going wrong. We ended up going with AD-Pro Authentication. HOWEVER, the version of that on the DNN Store is very OLD and also doesn't work. We had to contact their support to get the newest version which does work. |
There is not support currently in this module to bind to LDAPS. If your domain controller requires that then you will get an error message. After reviewing the code, this behavior is confirmed. If you add LDAPS to the front of your string, it will be stripped off and replaced with GC. For this module to connect to a domain controller, LDAPS will need to be optional, not required. I will make this a feature request. Hopefully I, or someone, can add this ability soon. I am currently working through the module on other issues and adding dependency injection. |
duplicate #74 |
I was receiving this as well. After looking through the logs through DNN I discovered mine was due to an authentication error. I changed the username to include the domain, e.g. domain\username instead of what I was using, username by itself. |
This happens by default when using a Windows 2025 Domain Controller, as LDAP signing is the default setting in Windows 2025. |
I don't have a good way to test this problem. I have pushed a new release with a code change that hopefully will help with this issue. I need someone to install and test and provide feedback if possible. |
Thanks a lot for your efforts, @sawest! I will test that within the next days and give you feedback. Are there any specific settings in the provider configuration necessary? |
I am hoping this will fix the root domain error when updating the config. However, you may have to set the authentication type setting to signing instead of delegation. It would be good to test with delegation and see if logins work. If not, then switch to signing and see if that fixes it. This would tell us a lot and then we can add to the documentation. |
@sawest Could you please provide a DLL created in debug mode + the associated pdb file? (Just for the case some exceptions are fired...) |
I think I may have a way to test this in my environment after all. I will report back with what I find. |
@MaiklT I added the obj folder to branch version 8.0.0. You can find the files you asked for in the debug folder of that folder. |
@sawest Thanks! Will try it within the next days, and report the results... |
From my testing today, I believe the the setting will need to be secure. The root domain methods are statically set to delegation, however. I am changing that to use the setting in site settings. I have had success with this test. I am binding to a new 2025 server that was throwing the same error listed here. I will push new code and pre-release soon that can be tested. |
Release 8.00.04 is up that uses the authentication type in configured in settings to access the root domain. Try setting that to "secure" and see if the original issue still occurs. I have not been able to test login yet but have had good results with the error above. A log in test would be really good feedback too. |
Describe the bug
Module fails to fully validate against Windows Server 2019 AD. When trying to configure the module settings it always fails on the Checking Root Domain step but the Accessing Global Catalog and Accessing LDAP pass. We can see in the logs that the module successfully connects and pulls the user's information from AD but then fails on password validation. If we load the URL directly it kicks up the user/password prompt which does work for authentication.
/DesktopModules/AuthenticationServices/ActiveDirectory/WindowsSignin.aspx
The error we find in the logs for trying to save the settings or logging in is "A more secure authentication method is required for this server" which a variety of web searches suggest this might have to do with LDAP channel binding and LDAP signing.
https://support.microsoft.com/en-us/help/4520412/2020-ldap-channel-binding-and-ldap-signing-requirements-for-windows
We've tried a variety of root domains settings using DC=LAB,DC=GROUP,DC=UNIVERSITY,DC=EDU and LDAP:// and LDAPS://LAB.GROUP.UNIVERSITY.EDU and they all fail on the Checking Root Domain step. We've also tried every Authentication Type too and none of them fix it.
Software Versions
Screenshots
Error log
The below error is kicked out when trying to save the settings for the module to connect to our AD and also when trying to login.
The text was updated successfully, but these errors were encountered: