Technology Adapters

In this section:

This section provides information about iWay Technology Adapters in Release 6.0.1 Service Manager.


Top of page

x
iWay Adapter

This section provides information about the iWay Adapter for Release 6.0.1 Service Manager.



x
Resolved Issues

Top of page

x
iWay Adapter for RDBMS

This section provides information about the iWay Adapter for RDBMS for Release 6.0.1 Service Manager.



x
Enhancements

The iWay Adapter for RDBMS now supports the following features:


Top of page

x
iWay Application Protocol Adapter for LDAP

The iWay Application Protocol Adapter for LDAP allows operations (get, update, create, and delete) to be performed on LDAP servers provided that the user has the correct security credentials for the specific operation. This functionality should not be confused with support from iWay Service Manager for retrieving user information using LDAP.

The LDAP adapter functions using the target, adapter, and listener objects in the iWay registry. You must use the iWay Registry listener object when configuring in the iWay Service Manager Administration Console. iWay Service Manager has a built in LDAP repository read capability. This support is static, one-way information only (request/response). Complete configuration of the LDAP adapter objects can be found in the iWay Application Protocol Adapter for LDAP User's Guide. (DN3501963.0909)



x
Security Warning

Unless LDAP information is sent through Secure Sockets (SSL), all information including user and passwords, is sent in clear text using the channels configured in your service or event configuration.



x
Known Issues

Sample LDAP operation documents can be found in the iWay Application Protocol Adapter for LDAP User's Guide. (DN3501963.0909)



x
LDAP Operational Error Codes

For a list of LDAP operational error codes, refer to the following Web site:

http://wikis.sun.com/display/SunJavaSystem/LDAP+Error+Codes


x
Using Valid Characters for LDAP User and Group Names

When using LDAP as the user registry, the set of valid characters allowed within a user or group name is determined by the following Internet Engineering Task Force (IETF) Request for Comments (RFC):

The specific LDAP server can also dictate the validity of these characters.

In general, you can use special characters within a Distinguished Name. However, certain special characters require an additional escape character. The following special characters must be escaped when used in a Distinguished Name:



x
Active Directory Error Codes

For a list of Active Directory error codes, refer to the following Web site:

http://support.microsoft.com/kb/218185



x
Active Directory Bind Error Codes

This section lists Active Directory bind error codes.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 525, v893 HEX: 0x525 - user not found DEC: 1317 - ERROR_NO_SUCH_USER (The specified account does not exist.) NOTE: Returns when username is invalid.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 52e, v893 HEX: 0x52e - invalid credentials DEC: 1326 - ERROR_LOGON_FAILURE (Logon failure: unknown user name or bad password.) NOTE: Returns when username is valid but password/credential is invalid. Will prevent most other errors from being displayed as noted.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 530, v893 HEX: 0x530 - not permitted to logon at this time DEC: 1328 - ERROR_INVALID_LOGON_HOURS (Logon failure: account logon time restriction violation.) NOTE: Returns only when presented with valid username and password/credential.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 531, v893 HEX: 0x531 - not permitted to logon from this workstation DEC: 1329 - ERROR_INVALID_WORKSTATION (Logon failure: user not allowed to log on to this computer.) LDAP[userWorkstations: <multivalued list of workstation names>] NOTE: Returns only when presented with valid username and password/credential.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 532, v893 HEX: 0x532 - password expired DEC: 1330 - ERROR_PASSWORD_EXPIRED (Logon failure: the specified account password has expired.) LDAP[userAccountControl: <bitmask=0x00800000>] - PASSWORDEXPIRED NOTE: Returns only when presented with valid username and password/credential.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 533, v893 HEX: 0x533 - account disabled DEC: 1331 - ERROR_ACCOUNT_DISABLED (Logon failure: account currently disabled.) LDAP[userAccountControl: <bitmask=0x00000002>] - ACCOUNTDISABLE NOTE: Returns only when presented with valid username and password/credential.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 701, v893 HEX: 0x701 - account expired DEC: 1793 - ERROR_ACCOUNT_EXPIRED (The user's account has expired.) LDAP[accountExpires: <value of -1, 0, or extemely large value indicates account will not expire>] - ACCOUNTEXPIRED NOTE: Returns only when presented with valid username and password/credential.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 773, v893 HEX: 0x773 - user must reset password DEC: 1907 - ERROR_PASSWORD_MUST_CHANGE (The user's password must be changed before logging on the first time.) LDAP[pwdLastSet: <value of 0 indicates admin-required password change>] - MUST_CHANGE_PASSWD NOTE: Returns only when presented with valid username and password/credential.

80090308: LdapErr: DSID-0C09030B, comment: AcceptSecurityContext error, data 775, v893 HEX: 0x775 - account locked out DEC: 1909 - ERROR_ACCOUNT_LOCKED_OUT (The referenced account is currently locked out and may not be logged on to.) LDAP[userAccountControl: <bitmask=0x00000010>] - LOCKOUT NOTE: Returns even if invalid password is presented.


iWay Software