Hello Ronald,
We had the same issues but found a "workaround:
You can use "Delegated LDAP Authentication".
That way every existing user which already in the Confluence DB will be migrated to the new "cwd_user" table (Confluence is using CROWD modules now) and all new users and their groups will be added upon their first login.
This solution had some serious issues before the following bug was fixed - https://jira.atlassian.com/browse/CONF-22709 (Add on the fly group sync for delegated LDAP authentication.)
But it fixed for 3.5.13 now.
I've also asked to resolve the following issues to make this "Delegated LDAP Authentication" solution fully compatible with 3.2 and earlier versions of Confluence (Pre-"CROWD modules" integration):
1. https://jira.atlassian.com/browse/CONF-23845 - Allow LDAP users to be assigned to groups or permissions prior to initial log in
2. https://jira.atlassian.com/browse/CONF-23846 Clean up/sync delegated LDAP users
Please vote for those issues to make them more attractive for Atlassian to fix!!!
Here is an example of my configuration with our SUN Directory server:
Name: Delegated LDAP Authentication Hybrid
Active: true
Type: DELEGATING
Created date: 2011-10-31 14:40:14.0
Updated date: 2011-10-31 14:40:14.0
Allowed operations: [UPDATE_ROLE_ATTRIBUTE, CREATE_USER, UPDATE_USER_ATTRIBUTE, UPDATE_USER, DELETE_USER, CREATE_ROLE, UPDATE_GROUP, CREATE_GROUP, UPDATE_GROUP_ATTRIBUTE, DELETE_GROUP, DELETE_ROLE, UPDATE_ROLE]
Implementation class: com.atlassian.crowd.directory.DelegatedAuthenticationDirectory
Encryption type: null
Attributes:
"autoAddGroups": "confluence-users"
"crowd.delegated.directory.auto.create.user": "true"
"crowd.delegated.directory.auto.update.user": "true"
"crowd.delegated.directory.importGroups": "true"
"crowd.delegated.directory.type": "com.atlassian.crowd.directory.SunONE"
"ldap.basedn": "o=Monash University,c=AU"
"ldap.group.description": "description"
"ldap.group.dn": "ou=Groups"
"ldap.group.filter": "(objectclass=groupOfUniqueNames)"
"ldap.group.name": "cn"
"ldap.group.objectclass": "groupOfUniqueNames"
"ldap.group.usernames": "uniquemember"
"ldap.pagedresults": "false"
"ldap.pagedresults.size": "1000"
"ldap.password": (not shown)
"ldap.referral": "false"
"ldap.url": "ldap:
"ldap.user.displayname": "cn"
"ldap.user.dn": "null"
"ldap.user.email": "mail"
"ldap.user.filter": "(&(objectClass=inetOrgPerson)(uid=*))"
"ldap.user.firstname": "givenname"
"ldap.user.group": "memberOf"
"ldap.user.lastname": "sn"
"ldap.user.objectclass": "inetOrgPerson"
"ldap.user.username": "uid"
"ldap.user.username.rdn": "cn"
"ldap.userdn": "uid=mdsconfl, o=Monash University, c=AU"
"ldap.usermembership.use": "false"
"ldap.usermembership.use.for.groups": "false"
Hi Ronald,
Please bear in mind that I'm not working for Atlassian.
I'm just using the same "User Directory" as you here in Monash University (Melbourne).
I can only suggest to upgrade to 3.5.13 (and then you could upgrade to 4.1 later on) and use "Internal with LDAP Authentication User Directory" Dir.
I'm attaching config. that worked for me ldap6.jpg.
Your mileage may vary.
Cheers,
Leon Kolchinsky