What you can try is using instead the userPrincipalName
of the bind user (using Get-ADUser
in Powershell), or User logon name
in the GUI of AD), to see if that changes anything. It's a weird thing that works with AD servers, even though LDAP is used as protocol.
It should be in the form of <username>@<domain.tld>
.
I tried almost everything, and yes:
username@domain.de works as well for the initial connection check, but not for everything else
One last thing that might be useful is a complete properties dump of the bind user, using Get-ADUser -Identity <binduser> -Properties *
in Powershell. That way I could diff and see if any properties related to authentication etc. are set differently.
AccountExpirationDate :
accountExpires : 9223372036854775807
AccountLockoutTime :
AccountNotDelegated : False
AllowReversiblePasswordEncryption : False
AuthenticationPolicy : {}
AuthenticationPolicySilo : {}
BadLogonCount : 0
badPasswordTime : 133494498226291701
badPwdCount : 0
CannotChangePassword : True
CanonicalName : domain.de/Users/Username
Certificates : {}
City :
CN : Username
codePage : 0
Company :
CompoundIdentitySupported : {}
Country :
countryCode : 0
Created : 10.01.2019 12:00:13
createTimeStamp : 10.01.2019 12:00:13
Deleted :
Department :
Description :
DisplayName : Username
DistinguishedName : CN=Username,CN=Users,DC=domain,DC=de
Division :
DoesNotRequirePreAuth : False
dSCorePropagationData : {27.03.2023 10:07:05, 25.03.2023 10:46:15, 12.05.2022
21:11:47, 03.03.2021 22:10:01...}
EmailAddress :
EmployeeID :
EmployeeNumber :
Enabled : True
Fax :
GivenName : Username
HomeDirectory :
HomedirRequired : False
HomeDrive :
HomePage :
HomePhone :
Initials :
instanceType : 4
isDeleted :
KerberosEncryptionType : {}
LastBadPasswordAttempt : 11.01.2024 13:30:22
LastKnownParent :
lastLogoff : 0
lastLogon : 133494499302943860
LastLogonDate : 08.01.2024 13:19:37
lastLogonTimestamp : 133491899773255442
LockedOut : False
lockoutTime : 0
logonCount : 65535
LogonWorkstations :
Manager :
MemberOf : {}
MNSLogonAccount : False
MobilePhone :
Modified : 11.01.2024 13:32:10
modifyTimeStamp : 11.01.2024 13:32:10
msDS-FailedInteractiveLogonCountAtLastSuccessfulLogon : 0
msDS-LastSuccessfulInteractiveLogonTime : 133494499302943860
msDS-User-Account-Control-Computed : 0
Name : Username
nTSecurityDescriptor : System.DirectoryServices.ActiveDirectorySecurity
ObjectCategory : CN=Person,CN=Schema,CN=Configuration,DC=domain,DC=de
ObjectClass : user
ObjectGUID : xxxx-xxxx-xxx-xxx-xxxxxx
objectSid : S-xxxx-xxxx-xxxx-xxxx
Office :
OfficePhone :
Organization :
OtherName :
PasswordExpired : False
PasswordLastSet : xx.xx.20xx 18:24:11
PasswordNeverExpires : True
PasswordNotRequired : False
POBox :
PostalCode :
PrimaryGroup : CN=Domänen-Benutzer,CN=Users,DC=domain,DC=de
primaryGroupID : 513
PrincipalsAllowedToDelegateToAccount : {}
ProfilePath :
ProtectedFromAccidentalDeletion : False
pwdLastSet : xxxxxxxxxxxx
SamAccountName : Username
sAMAccountType : 805306368
ScriptPath :
sDRightsEffective : 15
ServicePrincipalNames : {}
SID : S-1-5-21-2501045716-178712919-340273635-3173
SIDHistory : {}
SmartcardLogonRequired : False
State :
StreetAddress :
Surname :
Title :
TrustedForDelegation : False
TrustedToAuthForDelegation : False
UseDESKeyOnly : False
userAccountControl : 66048
userCertificate : {}
UserPrincipalName :
Username@domain.de
uSNChanged : 24627482
uSNCreated : 5478890
whenChanged : 11.01.2024 13:32:10
whenCreated : 10.01.2019 12:00:13
Unfortunately, not really. You can look if the syslog (journalctl -b
) contains any additional error information pertaining to that, but everything you see in the task log is basically the whole log.
Nothing.
What I noticed by reviewing the "Get-ADUser": The sync IS a bad password login attempt.
Connection check when editing the connection with a wrong password: Bad password attempt gets a new timestamp.
Connection check when editing the connection with the correct password: Bad password attempt gets no new timestamp.
Sync: Bad password attempt gets a new timestamp.