Uploaded image for project: 'FishEye'
  1. FishEye
  2. FE-2686

Provide an authentication test for crowd / LDAP etc

    XMLWordPrintable

Details

    • Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

    Description

      There is no way to perform an authentication test with Crowd/LDAP authentication.

      This means that if an administrator gets the config wrong the only feedback they get is "Password incorrect or unknown user".

      e.g. if you have the wrong password for crowd you get the following error in the logs:

      Caused by: org.codehaus.xfire.fault.XFireFault: The password in the application's crowd.properties file does not match the password in Crowd. Application with invalid password: fisheye
              at org.codehaus.xfire.fault.Soap11FaultSerializer.readMessage(Soap11FaultSerializer.java:31)
              at org.codehaus.xfire.fault.SoapFaultSerializer.readMessage(SoapFaultSerializer.java:28)
              at org.codehaus.xfire.soap.handler.ReadHeadersHandler.checkForFault(ReadHeadersHandler.java:111)
              at org.codehaus.xfire.soap.handler.ReadHeadersHandler.invoke(ReadHeadersHandler.java:67)
              at org.codehaus.xfire.handler.HandlerPipeline.invoke(HandlerPipeline.java:131)
              at org.codehaus.xfire.client.Client.onReceive(Client.java:406)
              ... 66 more
       

      All you can see in the UI "Password incorrect or unknown user" when trying to login.

      If we had a test UI that gave some feedback to the administrators it would be much better.

      Attachments

        Issue Links

          Activity

            People

              Unassigned Unassigned
              andrew.myers Andrew Myers [Atlassian]
              Votes:
              2 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: