-
Bug
-
Resolution: Done
-
Major
-
8.0.0.Alpha4
-
None
LDAP security realm needs to have configurable timeouts.
The default LDAP connection timeout appears to be 2 minutes. If the ldap server is down, it could take 2 minutes for the connection to timeout. This can cause unneeded delay if you have configured multiple ldap servers for failover / redundancy.
The following hack appears to work:
+++ domain-management/src/main/java/org/jboss/as/domain/management/connections/ldap/LdapConnectionManagerService.java
@@ -132,6 +132,7 @@ public class LdapConnectionManagerService implements Service<LdapConnectionManag
result.put(Context.INITIAL_CONTEXT_FACTORY,initialContextFactory);
String url = config.require(URL).asString();
result.put(Context.PROVIDER_URL,url);
+ result.put("com.sun.jndi.ldap.connect.timeout", "500");
return result;
}
- relates to
-
WFCORE-997 Security realm using ldaps hangs forever during SSL handshake, when ldap server is killed
- Resolved
-
JBEAP-1126 Security realm using ldaps hangs forever during SSL handshake, when ldap server is killed
- Closed