Active Directory Connection Timeout

Nate Klingenstein ndk at sudonym.me
Fri Sep 7 13:41:22 EDT 2018


Teresa,

Your configuration looks okay to me and I would expect a faster transaction
than several minutes.  Have you tried watching the IdP's idp-process.log to
see precisely where the waiting is happening?  Each log entry will have a
timestamp.

Take care,
Nate.

On Fri, Sep 7, 2018 at 11:38 AM, Teresa Fasano <t.fasano at cineca.it> wrote:

> Hi,
> I configured an Idp v3 that uses two Active Directory for login and to
> retrieve the attributes.
>
> The configuration of the jaas.config is
> ldapUrl = "ldaps://dc1 ldaps://dc2
>
> The configuration of the attribute-resolver.xml is
>     <DataConnector id="myLDAP" xsi:type="LDAPDirectory"
>               ldapURL="%{idp.attribute.resolver.LDAP.ldapURL}"
>               baseDN="%{idp.attribute.resolver.LDAP.baseDN}"
>               principal="%{idp.attribute.resolver.LDAP.bindDN}"
> principalCredential="%{idp.attribute.resolver.LDAP.bindDNCredential}"
> useStartTLS="%{idp.attribute.resolver.LDAP.useStartTLS:true}"
> connectTimeout="%{idp.attribute.resolver.LDAP.connectTimeout}"
> responseTimeout="%{idp.attribute.resolver.LDAP.responseTimeout}"
>               validatorRef="shibboleth.NonFailFastValidator" >
>         <FailoverDataConnector ref="failoverFakeConnector" />
>         <FilterTemplate>
>             <![CDATA[
>                 %{idp.attribute.resolver.LDAP.searchFilter}
>             ]]>
>         </FilterTemplate>
>         <ConnectionPool
>             minPoolSize="%{idp.pool.LDAP.minSize:3}"
>             maxPoolSize="%{idp.pool.LDAP.maxSize:10}"
>             blockWaitTime="%{idp.pool.LDAP.blockWaitTime:PT3S}"
> validatePeriodically="%{idp.pool.LDAP.validatePeriodically:true}"
> validateTimerPeriod="%{idp.pool.LDAP.validatePeriod:PT5M}"
>             expirationTime="%{idp.pool.LDAP.idleTime:PT10M}"
> failFastInitialize="%{idp.pool.LDAP.failFastInitialize:false}" />
>     </DataConnector>
>
> Finally, in the ldap.properties I have:
> idp.authn.LDAP.ldapURL                          = ldaps://dc1 ldaps://dc2
> idp.authn.LDAP.connectTimeout                   = 3000
> idp.attribute.resolver.LDAP.connectTimeout      =
> %{idp.authn.LDAP.connectTimeout:PT3S}
> idp.attribute.resolver.LDAP.responseTimeout     =
> %{idp.authn.LDAP.responseTimeout:PT3S}
>
> We performed a test where the first dc1 was disconnected, making it
> unavailable and leaving only the dc2 active.
> The test was used to verify whether authentication continued to work with
> dc2.
> The result was that the authentication and the attribute release has
> become very slow (several minutes) because probably the idp check the
> connection of the first AD before to use the second one.
>
> I have read that it is possible to use the connectTimeout = "3000"
> parameter in the jaas.config
>
> Can you recommend a configuration to make fast authentication in case the
> first Active Directory is not available?
> Thank you,
> T.
>
> --
> For Consortium Member technical support, see
> https://wiki.shibboleth.net/confluence/x/coFAAg
> To unsubscribe from this list send an email to
> users-unsubscribe at shibboleth.net
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://shibboleth.net/pipermail/users/attachments/20180907/c227f44f/attachment.html>


More information about the users mailing list