<?xml version="1.0" encoding="UTF-8"?> 
<?xml-stylesheet href="https://dev.horde.org/themes/horde//default/feed-rss.xsl" type="text/xsl"?> 
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"> 
 <channel> 
  <title>Sort out LDAP preferences mess with user bindings</title> 
  <pubDate>Fri, 10 Apr 2026 15:26:35 +0000</pubDate> 
  <link>https://bugs.horde.org/ticket/8353</link> 
  <atom:link rel="self" type="application/rss+xml" title="Sort out LDAP preferences mess with user bindings" href="https://bugs.horde.org/ticket/8353/rss" /> 
  <description>Sort out LDAP preferences mess with user bindings</description> 
 
   
   
  <item> 
   <title>If the LDAP preferences have been configured to bind with th</title> 
   <description>If the LDAP preferences have been configured to bind with the user&#039;s credentials, we can&#039;t retrieve other users&#039; preference, e.g. to display their full names etc. This problem manifests at many different points, this ticket is supposed to help finding a general solution.

Possible problems, discussions, and patches can be found in the tickets #7418, #8246, #8270, #8271, #8251, #8269.



It would be great if someone taking part in those discussions could summarize them and show the possible solutions.</description> 
   <pubDate>Tue, 16 Jun 2009 13:37:05 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t54603</link> 
  </item> 
   
  <item> 
   <title>My .02:



FWIW, this is not an issue completely specific to</title> 
   <description>My .02:



FWIW, this is not an issue completely specific to LDAP.  It&#039;s an issue with any existing or future prefs backend that requires an explicit user login. LDAP is one, IMSP is another. Granted, IMSP is a really bad choice for a prefs backend for a variety of reasons, not the least of which is that it is *impossible* to access another user&#039;s prefs via the IMSP server without logging in as that user, but we have a driver for it so it needs to be considered as well - unless we deprecate it.



Most of the patches in the other tickets focus on making sure we pass the user&#039;s current Horde password ( as returned by Auth::getCredential(&#039;password&#039;)).  While this makes sense in the cases where we are 100% sure we are fetching prefs for the current user, this doesn&#039;t help one bit in other cases. As an aside - is it safe to assume that a user&#039;s Horde credentials will be the user&#039;s LDAP credentials?



The bigger issue, IMO, is how the failure is handled in Prefs:: - right now, we call $notification-&gt;push() directly from Prefs_*::_retrieve() and remember the failure regardless of the user we are attempting to connect as. So any further attempts at prefs access - even if from the current user - are never even attempted.  So, the question is how to fix this in a BC way.  



Ideally, we shouldn&#039;t push a notification when failing for a user other then the current and make sure out applications are tolerant to not having access to other users&#039; prefs - but doing this in a BC way by comparing Prefs::_user with Auth::getAuth() is a bit hackish. Even if we don&#039;t ignore the failure we need to change how we remember the failure in the session - something like $_SESSION[&#039;prefs_cache&#039;][&#039;unavailable&#039;][$username_hash] instead of just $_SESSION[&#039;prefs_cache&#039;][&#039;unavailable&#039;] so that any subsequent prefs access will not fail for the current user.

</description> 
   <pubDate>Tue, 16 Jun 2009 15:46:08 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t54611</link> 
  </item> 
   
  <item> 
   <title>

&gt; remember the failure regardless of the user 

&gt; we are a</title> 
   <description>

&gt; remember the failure regardless of the user 

&gt; we are attempting to connect as. So any further attempts at prefs 

&gt; access - even if from the current user - are never even attempted.  



Looking further, I misread the code in that method dealing with remembering the errror. We only check the session for a previous error if _connect returns an error - so this specific part isn&#039;t an issue in this case.  It would only be an issue in that it could hide a later, unrelated error...a very fringe case I would think.  I still think comparing Prefs::_user and Auth::getAuth() before pushing the notification would be a reasonable way to go here though.</description> 
   <pubDate>Tue, 16 Jun 2009 16:58:50 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t54614</link> 
  </item> 
   
  <item> 
   <title>Longer term - i.e., not for 3.3.x - do we want to consider h</title> 
   <description>Longer term - i.e., not for 3.3.x - do we want to consider having a locally accessible version of everyone&#039;s preferences, even if the main source for them is LDAP/IMSP?</description> 
   <pubDate>Tue, 16 Jun 2009 21:15:57 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t54617</link> 
  </item> 
   
  <item> 
   <title>That&#039;s an interesting thought.  My first reaction would be t</title> 
   <description>That&#039;s an interesting thought.  My first reaction would be that depending on how the local version of the data is stored, it might defeat the purpose of not using a SQL database to store it to begin with. 



On the other hand, if you want the functionality, you have to pay the price. :)

</description> 
   <pubDate>Tue, 16 Jun 2009 22:21:33 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t54618</link> 
  </item> 
   
  <item> 
   <title>Bringing this back up...</title> 
   <description>Bringing this back up...</description> 
   <pubDate>Sun, 20 Feb 2011 01:47:43 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t61857</link> 
  </item> 
   
  <item> 
   <title>Don&#039;t know if this is still relevant, but LDAP is not my are</title> 
   <description>Don&#039;t know if this is still relevant, but LDAP is not my area so removing myself.</description> 
   <pubDate>Thu, 18 Oct 2012 05:19:24 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t73792</link> 
  </item> 
   
  <item> 
   <title>Not an issue anymore since we always bind as configured now,</title> 
   <description>Not an issue anymore since we always bind as configured now, with admin or user credentials.</description> 
   <pubDate>Thu, 28 Jan 2016 20:29:31 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/8353#t89740</link> 
  </item> 
   
   
 
 </channel> 
</rss> 
