When trying to connect, I would then receive the following error "Connect Error Result Code: 91 (Connect Error)"
This is for an old version of OpenDJ (2.6 to be exact) though that shouldn't matter. Fairly explicit error however it became more of a factor trying to troubleshooting an it needed. It also justified me writing a blog about it knowing that future Daniel comes back and say, 'oh, thanks Past-Daniel!'
Remember, bat for windows!
Firstly, the ldapsearch.bat is the file that needs to be executed. This can be located within the opendj\bat. A lot of the ForgeRock supports the UNIX commands (which I also prefer) though the bin directory here is redundant.
It's the ldapsearch.bat file and not the ldapsearch file that is needed here. In hindsight, it's obvious. I do feel idiotic writing this though when you're more a unix-than-a-windows-guy (which is a real thing!) and when you're following the ForgeRock documentation, it's not completely obvious. When you execute the .\ldapsearch command though it prompts you with a 'How do you want to open this file?', the first thing that came into mind was an ACL permissions issues
Back to the error
Back to the error, "Connect Error Result Code: 91 (Connect Error)". The LDAP command can be executed using the .bat file though this constantly popped up. This non-ssl connection should always be executed on the LDAP instance itself for obvious reason. Also, this is why you would see examples as having the parameter as -h localhost. This is OK though explicitly indicating the FQN or IP address could resolve this for you.
The next parameter is the username and password. The openDJ control panel can be started and you can use the username/password in there. Again, this is located within the bat directory.
Confirming the username/password would eliminate the possibility that it's a credential issues. Then, them there's the port number. Turned out that this was the issue for me. When reviewing the opendj/logs/server.out file, the following was logged.
category=PROTOCOL severity=NOTICE msgID=2556180 msg=Started listening for new connections on Administration Connector 0.0.0.0 port 4444. category=PROTOCOL severity=NOTICE msgID=2556180 msg=Started listening for new connections on LDAP Connection Handler 0.0.0.0 port 389. category=CORE severity=NOTICE msgID=458887 msg=The Directory Server has started successfully
... This say the classic 389 port number for LDAP. Why was I using 1389. Turned out that the example queries I intended to use indicated a different port number. Again, simple enough though took time to discover such an issue as well as write this blog! Comments below are always welcome
About the author
Daniel is a Technical Manager with over 10 years of consulting expertise in the Identity and Access Management space.Daniel has built from scratch this blog as well as technicalconfessions.com
Follow Daniel on twitter @nervouswiggles
Comments
Other Posts
AS I was migrating my environment into an S3 environment, I wanted to leverage off the SES services that AWS provide, more specifically, to leverage the off the SMTP functionality by sending an email via PHP
Read More...
The WeMos D1 is a ESP8266 WiFi based board is an extension to the current out-of-the-box library that comes with the Arduino installation. Because of this, you need to import in the libraries as well as acknowledging the specific board. This process is highly confusion with a number of different individuals talking about a number of different ways to integrate.
Read More...
NameID element must be present as part of the Subject in the Response message, please enable it in the IDP configuration.
Read More...
For what I see, there's not too many supportive documentations out there that will demonstrate how provision AD group membership with the ICF connector using OpenIDM. The use of the special ldapGroups attribute is not explained anywhere in the Integrators guides to to the date of this blog. This quick blog identifies the tasks required to provision AD group membership from OpenIDM to AD using the LDAP ICF connector. However this doesn't really explain what ldapGroups actually does and there's no real worked example of how to go from an Assignment to ldapGroups to an assigned group in AD. I wrote up a wiki article for my own reference: AD group memberships automatically to users This is just my view, others may disagree, but I think the implementation experience could be improved with some more documentation and a more detailed example here.
Read More...
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid Because they all share the ICF connector framework, the error/solution would be the same.
Read More...
org.forgerock.script.exception.ScriptCompilationException: missing ; before statement
Read More...
ForgeRock IDM - org.forgerock.script.exception.ScriptCompilationException: missing ; before statement
Read More...
When performing the attempt of a reconciliation from ForgeRock IDM to Active Directory, I would get the following error
Read More...
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid Because they all share the ICF connector framework, the error/solution would be the same.
Read More...
During the reconcilation from OpenIDM to the ICF google apps connector, the following error response would occur. ERROR Caused by com.google.api.client.auth.oauth2.TokenResponseException 400 Bad Request - invalid_grant
Read More...