Unable to access LDAP from dmz :: Failed to get domain information (1355)

try to access the ldap server from the iis server in dmz and get an error message: Domain information could not be restored (1355). There are articles about adding DNS data or using basic objects, but these solutions do not work for me, so please refrain from searching on Google and posting the same reckless bad tips.

I rewrote the entire layer to use the main objects. At least I got an error message.

using System; using System.Collections; using System.Collections.Generic; using System.DirectoryServices; using System.DirectoryServices.AccountManagement; using System.Linq; using System.Web; using TheDomain.Common.Extensions; namespace MobileApplications { public class Ldap35: IDisposable { private string _ldapserver; private string _adminUser; private string _adminPassword; private PrincipalContext _connection; private UserPrincipal _userData; private IList<string> _groups; public delegate void MessagingHandler(string message); public event MessagingHandler Messaged; public Ldap35(string server, string adminuser, string adminpassword) { _ldapserver = server; _adminPassword = adminpassword; _adminUser = adminuser; } /// <summary> /// this will basically instantiate a UserPrincipal /// </summary> /// <param name="username">just the user</param> /// <param name="pass">just the password</param> /// <param name="domain">the correct domain, not sure if this is thedoamin.com or the_domain</param> /// <returns></returns> public bool Authenticate(string username, string pass, string domain) { if ( _connection == null) EstablishDirectoryConnection(); ValidateConnection(); if (!domain.IsEmpty() && !username.Contains("\\") && !username.Contains("/")) username = domain + "\\" + username; _userData = UserPrincipal.FindByIdentity(_connection, username); if (_userData == null) throw new ApplicationException("Unable to locate user."); if (! _connection.ValidateCredentials(username, pass)) throw new ApplicationException("Invalid credentials. Unable to log in."); //_userData = new UserPrincipal( _connection, username, pass, true ); return true; } public bool Authenticate(string username, string pass) { return Authenticate(username, pass, ""); } public bool IsMemeberOfGroup(string group) { ValidateConnection(); ValidateUser(); return _userData.IsMemberOf(new GroupPrincipal(_connection)); } public bool IsMemeberOfGroup(string group, bool caseSensitive) { if (caseSensitive) return IsMemeberOfGroup(group); GetGroups(); return _groups.Any(g => g.ToLower().Trim() == group.ToLower().Trim()); } // public IList<string> GetGroups() // { // if ( _groups == null ) // _groups = new List<string>(); // // ValidateConnection(); ValidateUser(); // // var results = _userData.GetGroups(); // // foreach (var principal in results) // { // _groups.Add(principal.Name); // } // // return _groups; // } public IList<string> GetGroups() { if (_groups == null) _groups = new List<string>(); ValidateConnection(); ValidateUser(); Print("Getting groups"); DirectoryEntry de = (DirectoryEntry)_userData.GetUnderlyingObject(); object obGroups = de.Invoke("Groups"); foreach (object ob in (IEnumerable)obGroups) { // Create object for each group. var obGpEntry = new DirectoryEntry(ob); Print(obGpEntry.Name); _groups.Add(obGpEntry.Name); } return _groups; } /// <summary> /// PrincipalContext class to establish a connection to the target directory and specify credentials for performing operations against the directory. This approach is similar to how you would go about establishing context with the DirectoryContext class in the ActiveDirectory namespace. /// </summary> /// <param name="adminuser">a user with permissions on the domain controller</param> /// <param name="adminpassword">the password to go with the above</param> /// <returns></returns> private void EstablishDirectoryConnection() { _connection = new PrincipalContext(ContextType.Domain, _ldapserver, "DC=thedomain,DC=com", ContextOptions.SimpleBind, _adminUser, _adminPassword); } private void Print(string message) { if (Messaged != null) Messaged(message); } private void ValidateConnection() { if ( _connection == null) throw new ApplicationException("No connection to server, please check credentials and configuration."); } private void ValidateUser() { if (_userData == null) throw new ApplicationException("User is not authenticated. Please verify username and password."); } public void Dispose() { _userData.Dispose(); _connection.Dispose(); } } } 
+7
source share
1 answer

This Active Directory article - adding a user to a group from a non-domain computer throws a PrincipalException , pointing me in the right direction. Although this really does not make sense. I switched to a more modern approach than higher than using PrincipalObjects, for example:

 var _connection = new PrincipalContext(ContextType.Domain, _ldapserver, "DC=domain,DC=com", ContextOptions.SimpleBind, _adminUser, _adminPassword); var _userData = UserPrincipal.FindByIdentity(_connection, username); 

this allowed me to pass the correct permissions to the domain controller, but then the group method on the UserPrinicpal object chose error 1155.

I solved this using the old method as follows. Now everything is working well.

 DirectoryEntry de = (DirectoryEntry)_userData.GetUnderlyingObject(); object obGroups = de.Invoke("Groups"); 
+7
source

All Articles