2020-02-05 04:31:22 +00:00
|
|
|
import time
|
|
|
|
import ldap
|
|
|
|
import ldap.modlist as modlist
|
2020-02-05 04:32:25 +00:00
|
|
|
import secrets
|
2020-02-05 04:31:22 +00:00
|
|
|
import base64
|
|
|
|
|
2020-02-05 05:42:42 +00:00
|
|
|
from flask import abort
|
|
|
|
HTTP_NOTFOUND = 404
|
|
|
|
|
2020-02-05 04:31:22 +00:00
|
|
|
ldap.set_option(ldap.OPT_X_TLS_REQUIRE_CERT, ldap.OPT_X_TLS_NEVER)
|
2020-02-05 05:00:21 +00:00
|
|
|
ldap.set_option(ldap.OPT_X_TLS_CACERTFILE, './ProtospaceAD.cer')
|
2020-02-05 04:31:22 +00:00
|
|
|
l = ldap.initialize('ldaps://ldap.ps.protospace.ca:636')
|
|
|
|
l.set_option(ldap.OPT_REFERRALS, 0)
|
|
|
|
l.set_option(ldap.OPT_PROTOCOL_VERSION, 3)
|
|
|
|
l.set_option(ldap.OPT_X_TLS,ldap.OPT_X_TLS_DEMAND)
|
|
|
|
l.set_option(ldap.OPT_X_TLS_DEMAND, True)
|
|
|
|
l.set_option(ldap.OPT_DEBUG_LEVEL, 255)
|
|
|
|
|
|
|
|
# === Protospace ===
|
|
|
|
BASE = 'DC=ps,DC=protospace,DC=ca'
|
2020-02-05 05:42:42 +00:00
|
|
|
#BASE_Members = 'OU=XTest,OU=GroupsOU,DC=ps,DC=protospace,DC=ca'
|
|
|
|
BASE_Members = 'OU=MembersOU,DC=ps,DC=protospace,DC=ca'
|
2020-02-05 04:31:22 +00:00
|
|
|
BASE_Groups = 'OU=GroupsOU,DC=ps,DC=protospace,DC=ca'
|
|
|
|
|
|
|
|
def search(query):
|
|
|
|
'''
|
|
|
|
Search for a user by sAMAccountname
|
|
|
|
'''
|
|
|
|
try:
|
2020-02-05 04:32:25 +00:00
|
|
|
bind = l.simple_bind_s(secrets.LDAP_USERNAME, secrets.LDAP_PASSWORD)
|
2020-02-05 04:31:22 +00:00
|
|
|
|
|
|
|
criteria = '(&(objectClass=user)(sAMAccountName={})(!(objectClass=computer)))'.format(query)
|
|
|
|
results = l.search_s(BASE_Members, ldap.SCOPE_SUBTREE, criteria, ['displayName','sAMAccountName','email'] )
|
|
|
|
|
|
|
|
print(" =============")
|
|
|
|
print(" Found %d Objects" % len(results))
|
|
|
|
print(" =============")
|
|
|
|
|
|
|
|
for result in results:
|
|
|
|
dn, attr = result
|
|
|
|
print(dn, attr)
|
|
|
|
|
|
|
|
if (len(results) == 1):
|
|
|
|
print("length = 1")
|
|
|
|
|
|
|
|
return(len(results))
|
|
|
|
|
|
|
|
finally:
|
|
|
|
l.unbind()
|
|
|
|
|
2020-02-05 05:00:21 +00:00
|
|
|
def find_user(query):
|
2020-02-05 04:31:22 +00:00
|
|
|
'''
|
|
|
|
Search for a user by sAMAccountname
|
|
|
|
'''
|
|
|
|
try:
|
2020-02-05 04:32:25 +00:00
|
|
|
bind = l.simple_bind_s(secrets.LDAP_USERNAME, secrets.LDAP_PASSWORD)
|
2020-02-05 04:31:22 +00:00
|
|
|
criteria = '(&(objectClass=user)(sAMAccountName={})(!(objectClass=computer)))'.format(query)
|
2020-02-05 05:42:42 +00:00
|
|
|
results = l.search_s(BASE_Members, ldap.SCOPE_SUBTREE, criteria, ['displayName','sAMAccountName','email'] )
|
|
|
|
|
|
|
|
if len(results) != 1:
|
|
|
|
return False
|
|
|
|
|
|
|
|
return results[0][0]
|
2020-02-05 04:31:22 +00:00
|
|
|
finally:
|
|
|
|
l.unbind()
|
2020-02-05 05:42:42 +00:00
|
|
|
print('unbound find')
|
2020-02-05 04:31:22 +00:00
|
|
|
|
|
|
|
def findgroup(query):
|
|
|
|
'''
|
|
|
|
Search for a group by sAMAccountname
|
|
|
|
'''
|
|
|
|
try:
|
2020-02-05 04:32:25 +00:00
|
|
|
bind = l.simple_bind_s(secrets.LDAP_USERNAME, secrets.LDAP_PASSWORD)
|
2020-02-05 04:31:22 +00:00
|
|
|
|
|
|
|
criteria = '(&(objectClass=group)(sAMAccountName={}))'.format(query)
|
|
|
|
results = l.search_s(BASE_Groups, ldap.SCOPE_SUBTREE, criteria, ['displayName','sAMAccountName'] )
|
|
|
|
|
|
|
|
for result in results:
|
|
|
|
#print(" --- ")
|
|
|
|
#print(results)
|
|
|
|
dn, attr = result
|
|
|
|
print(dn, attr)
|
|
|
|
|
|
|
|
rCode = "OK"
|
|
|
|
|
|
|
|
except Exception as inst:
|
|
|
|
print("== Entering Except ==")
|
|
|
|
rCode = type(inst)
|
|
|
|
print(type(inst)) # the exception instance
|
|
|
|
|
|
|
|
finally:
|
|
|
|
l.unbind()
|
|
|
|
return(rCode)
|
|
|
|
|
2020-02-04 06:18:37 +00:00
|
|
|
def create_user(first, last, username, email, password):
|
2020-02-05 04:31:22 +00:00
|
|
|
'''
|
|
|
|
Create a User; required data is first, last, email, username, password
|
|
|
|
Note: this creates a disabled user, then sets a password, then enables the user
|
|
|
|
'''
|
|
|
|
try:
|
2020-02-05 04:32:25 +00:00
|
|
|
bind = l.simple_bind_s(secrets.LDAP_USERNAME, secrets.LDAP_PASSWORD)
|
2020-02-05 04:31:22 +00:00
|
|
|
dn = 'CN={} {},{}'.format(first, last, BASE_Members)
|
|
|
|
full_name = '{} {}'.format(first, last)
|
|
|
|
|
|
|
|
ldif = [
|
|
|
|
('objectClass', [b'top', b'person', b'organizationalPerson', b'user']),
|
|
|
|
('cn', [full_name.encode()]),
|
|
|
|
('userPrincipalName', [username.encode()]),
|
|
|
|
('sAMAccountName', [username.encode()]),
|
|
|
|
('givenName', [first.encode()]),
|
|
|
|
('sn', [last.encode()]),
|
|
|
|
('DisplayName', [full_name.encode()]),
|
|
|
|
('userAccountControl', [b'514']),
|
|
|
|
('mail', [email.encode()]),
|
|
|
|
]
|
|
|
|
|
|
|
|
l.add_s(dn, ldif)
|
|
|
|
rCode = "OK"
|
|
|
|
|
|
|
|
# set password
|
|
|
|
pass_quotes = '"{}"'.format(password)
|
|
|
|
pass_uni = pass_quotes.encode('utf-16-le')
|
|
|
|
change_des = [(ldap.MOD_REPLACE, 'unicodePwd', [pass_uni])]
|
|
|
|
result = l.modify_s(dn, change_des)
|
|
|
|
|
|
|
|
# 512 will set user account to enabled
|
|
|
|
mod_acct = [(ldap.MOD_REPLACE, 'userAccountControl', b'512')]
|
|
|
|
result = l.modify_s(dn, mod_acct)
|
2020-02-05 05:00:21 +00:00
|
|
|
|
2020-02-05 04:31:22 +00:00
|
|
|
finally:
|
|
|
|
print("== Entering Finally ==")
|
|
|
|
l.unbind()
|
|
|
|
return(rCode)
|
|
|
|
|
|
|
|
def create_group(groupname):
|
|
|
|
'''
|
|
|
|
Create a group, for proof of concept, will usually be done manually
|
|
|
|
'''
|
|
|
|
try:
|
|
|
|
dn = 'CN={},{}'.format(groupname, BASE)
|
2020-02-05 04:32:25 +00:00
|
|
|
bind = l.simple_bind_s(secrets.LDAP_USERNAME, secrets.LDAP_PASSWORD)
|
2020-02-05 04:31:22 +00:00
|
|
|
|
|
|
|
ldif = [
|
|
|
|
('objectClass', [b'group']),
|
|
|
|
('groupType', [b'-2147483646']),
|
|
|
|
('cn', [groupname.encode()]),
|
|
|
|
('name', [groupname.encode()]),
|
|
|
|
('sAMAccountName', [groupname.encode()]),
|
|
|
|
]
|
|
|
|
|
|
|
|
l.add_s(dn, ldif)
|
|
|
|
|
|
|
|
finally:
|
|
|
|
l.unbind()
|
|
|
|
|
2020-02-05 05:42:42 +00:00
|
|
|
def set_password(username, password):
|
|
|
|
try:
|
|
|
|
bind = l.simple_bind_s(secrets.LDAP_USERNAME, secrets.LDAP_PASSWORD)
|
|
|
|
criteria = '(&(objectClass=user)(sAMAccountName={})(!(objectClass=computer)))'.format(username)
|
|
|
|
results = l.search_s(BASE_Members, ldap.SCOPE_SUBTREE, criteria, ['displayName','sAMAccountName','email'] )
|
|
|
|
|
|
|
|
if len(results) != 1:
|
|
|
|
abort(HTTP_NOTFOUND)
|
|
|
|
|
|
|
|
dn = results[0][0]
|
|
|
|
|
|
|
|
# set password
|
|
|
|
pass_quotes = '"{}"'.format(password)
|
|
|
|
pass_uni = pass_quotes.encode('utf-16-le')
|
|
|
|
change_des = [(ldap.MOD_REPLACE, 'unicodePwd', [pass_uni])]
|
|
|
|
result = l.modify_s(dn, change_des)
|
|
|
|
finally:
|
|
|
|
l.unbind()
|
|
|
|
|
|
|
|
|
2020-02-05 04:31:22 +00:00
|
|
|
if __name__ == '__main__':
|
|
|
|
|
|
|
|
# ===========================================
|
|
|
|
# Sample Progams
|
|
|
|
# ===========================================
|
2020-02-05 05:00:21 +00:00
|
|
|
#print("----------------------------------------------------------------------------------------")
|
|
|
|
#i = 3
|
|
|
|
#
|
|
|
|
#if ( i == 1):
|
|
|
|
# rCode = find_user('*')
|
|
|
|
#elif (i == 2):
|
|
|
|
# rCode = search('*')
|
|
|
|
#elif (i == 3):
|
|
|
|
# rCode = create_user(
|
|
|
|
# 'billy',
|
|
|
|
# 'gates',
|
|
|
|
# 'billy.gates',
|
|
|
|
# 'billy.gates@protospace.ca',
|
|
|
|
# 'P@ssw0rd99'
|
|
|
|
# )
|
|
|
|
#elif ( i == 4):
|
|
|
|
# create_group('testgroup')
|
|
|
|
#else:
|
|
|
|
# print("No function selected")
|
|
|
|
#
|
|
|
|
#
|
|
|
|
#print("ReturnCode = " + str(rCode))
|
2020-02-05 04:31:22 +00:00
|
|
|
|
2020-02-05 05:42:42 +00:00
|
|
|
#print(find_user('tanner.collin'))
|
|
|
|
print(set_password('dsaftanner.collin', 'Supersecret@@'))
|