Uploaded image for project: 'WildFly'
  1. WildFly
  2. WFLY-2214

Allow additional environment properties to be set for outbound LDAP connections used by security realms.

    XMLWordPrintable

Details

    • Bug
    • Resolution: Done
    • Major
    • 8.0.0.CR1
    • 8.0.0.Alpha4
    • Management
    • None

    Description

      LDAP security realm needs to have configurable timeouts.

      The default LDAP connection timeout appears to be 2 minutes. If the ldap server is down, it could take 2 minutes for the connection to timeout. This can cause unneeded delay if you have configured multiple ldap servers for failover / redundancy.

      The following hack appears to work:

      +++ domain-management/src/main/java/org/jboss/as/domain/management/connections/ldap/LdapConnectionManagerService.java
      @@ -132,6 +132,7 @@ public class LdapConnectionManagerService implements Service<LdapConnectionManag
      result.put(Context.INITIAL_CONTEXT_FACTORY,initialContextFactory);
      String url = config.require(URL).asString();
      result.put(Context.PROVIDER_URL,url);
      + result.put("com.sun.jndi.ldap.connect.timeout", "500");
      return result;
      }

      Attachments

        Issue Links

          Activity

            People

              darran.lofthouse@redhat.com Darran Lofthouse
              rhn-support-dehort Derek Horton
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: