LDAP Proxy
Published Mar 18, 2015
Version 1.0Was this article helpful?
Are there any more recent examples of an iRule (or iRules LX) which are written to break up LDAP requests and operate on them? These are all written 6+ years ago. Is there anything more current out there?
I'm looking for any iRules that can parse (cleartext) LDAP requests (Bind, Search, Add, Modify, Delete) to call iRulesLX functions to handle each of those LDAP operations (Bind, Search, Add, Modify, Delete) in a custom manner (some of the data we'll send directly on to ActiveDirectory after some massaging, others we'll send to our RDBMS to store).
Does anyone have anything more current than this (which was a fine example in it's day)....