LDAPS should not be an advanced setting

Description

When authenticating using ldap, a simple bind is used.  This exposes the admin dn (account used to search ldap), and users username and password. 

I was able to confirm this while running wireshark on the ldap server that openfire authenticates with.

This can be mitigated by using ldaps and starttls.

Environment

None

Activity

Show:
Fixed

Details

Assignee

Reporter

Components

Fix versions

Priority

Created November 22, 2019 at 10:47 AM
Updated November 22, 2019 at 7:44 PM
Resolved November 22, 2019 at 7:44 PM