Forum Discussion
error 'invalid ciphertext' in APM with ACCESS::policy evaluate
Hi,
i have this irule :
set flow_sid [ACCESS::session create -timeout 600 -lifetime 3600]
ACCESS::policy evaluate -sid $flow_sid -profile /Common/access_aa session.logon.last.username [HTTP::username] session.logon.last.password [HTTP::password] session.server.landinguri [string tolower [HTTP::uri]]
but it does not work.
I have this error in /var/log/apm:
Oct 3 13:48:33 pyxb596 err apmd[14633]: 01490000:3: modules/Authentication/Ldap/LdapAgent.cpp func: "getLdapUserInput()" line: 780 Msg: 8c0d9b6d794d371f1a5142d945e3b92d: LDAP Agent: getLdapUserInput(): unable to decrypt user password due to invalid ciphertext
TMOS Version : 12.1.3.6
someone can help me. thank you in advance.
4 Replies
- Stanislas_Piro2
Cumulonimbus
there are some trouble with ACCESS::session create if "Accept-Language" is not set in HTTP_REQUEST event... try this:
if { [HTTP::header value "Accept-Language"] eq "" } then { A "Accept-language" header is not present. Injecting language code = none HTTP::header insert "Accept-Language" "none" } set flow_sid [ACCESS::session create -timeout 600 -lifetime 3600] ACCESS::policy evaluate -sid $flow_sid -profile /Common/access_aa session.logon.last.username [HTTP::username] session.logon.last.password [HTTP::password] session.server.landinguri [string tolower [HTTP::uri]]
Why do you set a lifetime to 3660 and a timeout to 600? try to change these values to lower.
set flow_sid [ACCESS::session create -timeout 60 -lifetime 120]
Look at this code as example of working command
- david78
Nimbostratus
Thank you for your answer. I just did the test with this code, it's always the same.
The header 'Accept-Language' is sent by Chrome, as well as 'Auhorization' :
- Accept-Language: en-US, en; q = 0.9, en-US; q = 0.8, en; q = 0.7
- Authorization: Basic MzI6MzI =
concerning the timers, I took those of the example in the wiki;)
https://devcentral.f5.com/wiki/iRules.ACCESS__policy.ashx
- david78
Nimbostratus
I do not think so. the same policy (and therefore AAA LDAP Server) works when applied to the VS.
- Stanislas_Piro2
Cumulonimbus
I guess you want to authenticate without redirect to /my.policy.
instead of $1, try the code provided here to enable clientless-mode.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com