-
Notifications
You must be signed in to change notification settings - Fork 136
Expand file tree
/
Copy pathms_ad_bind.py
More file actions
38 lines (29 loc) · 1.03 KB
/
ms_ad_bind.py
File metadata and controls
38 lines (29 loc) · 1.03 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
# How to bind to MS AD with python-ldap and various methods
import ldap,ldap.sasl
ldap_uri = "ldap://dc1.example.com"
dn = "CN=Anna Blume,CN=Users,DC=addomain,DC=example,DC=com"
sAMAccountName = "ABlume"
userPrincipalName = "ablume@addomain.example.com"
password = 'testsecret'
trace_level = 2
l = ldap.initialize(ldap_uri,trace_level=trace_level)
# Normal LDAPv3 compliant simple bind
l.simple_bind_s(dn,password)
# This is AD-specific and not LDAPv3 compliant
l.simple_bind_s(userPrincipalName,password)
# This is AD-specific and not LDAPv3 compliant
l.simple_bind_s(userPrincipalName,password)
# SASL bind with mech DIGEST-MD5 with sAMAccountName as SASL user name
sasl_auth = ldap.sasl.sasl(
{
ldap.sasl.CB_AUTHNAME:sAMAccountName,
ldap.sasl.CB_PASS :password,
},
'DIGEST-MD5'
)
l.sasl_interactive_bind_s("", sasl_auth)
# SASL bind with mech GSSAPI
# with the help of Kerberos V TGT obtained before with command
# kinit ablume@ADDOMAIN.EXAMPLE.COM
sasl_auth = ldap.sasl.sasl({},'GSSAPI')
l.sasl_interactive_bind_s("", sasl_auth)