Thank you Aliaksandr!
To answer some of your questions and comments:
> The part about using Gluu as a sort of aggregation LDAP directory which will be used by you services for authentication - how exactly do you expect this to work?
Ideally, I want to use CR to easily transfer all the information from our main current LDAP (LDAP-A) directory into Gluu. I'd let it continue to refresh until we test and re-point our services to the Gluu Server LDAP. Once they are working with Gluu, then I would like to stop the CR for that server only, and permanently shut down the old server (LDAP-A).
At the same time, I need to add the AD server in a "normal" CR setup, with AD handling authentication, caching attributes (and possibly modifying those attributes in the process).
I do understand that the strength of the Gluu Server is when using OpenID Connect, SAML or CAS. And we hope to move that direction with our services in the future. However, a couple of our most critical services only support LDAP, or SAML provides a reduced set of capabilities. So until they are changed, we still need to stick with LDAP authentication. While we won't be using all the strenghts of the Gluu Server to begin with, it will allow us to make use of them in the future.
Right now, our "interface" for managing the existing "primary" LDAP (What I called LDAP-A above) is horrendous and not admin user friendly. That's why I'd like to transition that server completely to Gluu, since the Gluu interface would be a huge improvement.
In addition to the Active Directory CR mentioned above, in the future, I want to start using two other LDAP servers in the "normal" CR way, where attributes are cached in Gluu, but actually authenticated on the backend servers. But that is "phase 2 or 3".
> Did you somehow manage to pull hashed passwords into Gluu's LDAP using CR, and after that login with user entries created like that? Or were those passwords in clear-text format? It's still a bit new to me, it's not a regular way CR is used, and I don't think we tried something like that before.
Yes. CR pulled the hashed (SHA) passwords into the new Gluu account. I just set this up again and verified that it works. After the sync, I was able to login to a service using the credentials that worked with LDAP-A. I then changed the password for this account in Gluu and then authenticated again successfully with the new password. Then I verified that the original LDAP server still had the original password. So it was clearly authenticating against the Gluu Server and not passing it through. I had also NOT setup anything in the Manage Authentication section. It still has the default settings for the local LDAP. (Note that after changing the password on the Gluu Server, the password changed from "SHA Hashed" to "SSHA-512 Hashed" as seen in Directory Studio.)
As I work to setup AD (and eventually the other two LDAP servers) for CR, I'll need to figure out the basic multi-auth script. Your information about that is very helpful. Thank you!
I think you've given me enough to get started, unless you see a real flaw in my plan. I'm open to suggestions of better ways, since I only know enough to be dangerous. :-)
But I'll consider this closed... Until I get stuck in the process. :-)
Thanks again!