218 lines
10 KiB
Python
218 lines
10 KiB
Python
from ldap3 import *
|
||
from ldap3.core.exceptions import LDAPInvalidCredentialsResult, LDAPOperationResult
|
||
from ldap3.core.results import *
|
||
from ldap3.utils.dn import safe_dn
|
||
import os
|
||
APP_ENV = os.getenv('APP_ENV')
|
||
if APP_ENV == 'dev':
|
||
from conf.local_settings_dev import *
|
||
else:
|
||
from conf.local_settings import *
|
||
|
||
"""
|
||
根据以下网站的说明:
|
||
https://docs.microsoft.com/zh-cn/troubleshoot/windows/win32/change-windows-active-directory-user-password
|
||
密码存储在 unicodePwd 属性中的用户对象的 AD 和 LDS 数据库中。 此属性可以在受限条件下写入,但无法读取。 只能修改属性;无法在对象创建时或由搜索查询时添加它。
|
||
为了修改此属性,客户端必须具有到服务器的 128 位传输层安全性 (TLS) /Secure Socket Layer (SSL) 连接。
|
||
使用 SSP 创建的会话密钥(使用 NTLM 或 Kerberos)的加密会话也可接受,只要达到最小密钥长度。
|
||
若要使用 TLS/SSL 实现此连接:
|
||
服务器必须拥有 128 位 RSA 连接的服务器证书。
|
||
客户端必须信任生成服务器证书 (CA) 证书颁发机构。
|
||
客户端和服务器都必须能够进行 128 位加密。
|
||
|
||
unicodePwd 属性的语法为 octet-string;但是,目录服务预期八进制字符串将包含 UNICODE 字符串 (,因为属性的名称指示) 。
|
||
这意味着在 LDAP 中传递的此属性的任何值都必须是 BER 编码的 UNICODE 字符串 (基本编码规则) 八进制字符串。
|
||
此外,UNICODE 字符串必须以引号开头和结尾,这些引号不是所需密码的一部分。
|
||
|
||
可通过两种方法修改 unicodePwd 属性。 第一种操作类似于正常的 用户更改密码 操作。
|
||
在这种情况下,修改请求必须同时包含删除和添加操作。 删除操作必须包含当前密码,并包含其周围的引号。
|
||
添加操作必须包含所需的新密码,其周围必须有引号。
|
||
|
||
修改此属性的第二种方法类似于管理员重置用户密码。 为此,客户端必须以具有修改其他用户密码的足够权限的用户进行绑定。
|
||
此修改请求应包含单个替换操作,其中包含用引号括起的新所需密码。 如果客户端具有足够的权限,则无论旧密码是什么,此密码都将变为新密码。
|
||
"""
|
||
|
||
|
||
class AdOps(object):
|
||
|
||
def __init__(self, auto_bind=True, use_ssl=AD_USE_SSL, port=AD_CONN_PORT, domain=AD_DOMAIN, user=AD_LOGIN_USER, password=AD_LOGIN_USER_PWD,
|
||
authentication=NTLM):
|
||
"""
|
||
AD连接器 authentication [SIMPLE, ANONYMOUS, SASL, NTLM]
|
||
:return:
|
||
|
||
"""
|
||
self.use_ssl = use_ssl
|
||
self.port = port
|
||
self.domain = domain
|
||
self.user = user
|
||
self.password = password
|
||
self.authentication = authentication
|
||
self.auto_bind = auto_bind
|
||
|
||
server = Server(host='%s' % AD_HOST, connect_timeout=1, use_ssl=self.use_ssl, port=port, get_info=ALL)
|
||
try:
|
||
self.conn = Connection(server, auto_bind=self.auto_bind, user=r'{}\{}'.format(self.domain, self.user), password=self.password,
|
||
authentication=self.authentication, raise_exceptions=True)
|
||
except LDAPOperationResult as e:
|
||
raise LDAPOperationResult("LDAPOperationResult: " + str(e))
|
||
except Exception as e:
|
||
raise Exception('LDAP Exception:无法连接到AD控制器 --- {}' .format(e))
|
||
|
||
def ad_auth_user(self, username, password):
|
||
"""
|
||
验证账号
|
||
:param username:
|
||
:param password:
|
||
:return: True or False
|
||
"""
|
||
try:
|
||
server = Server(host='%s' % AD_HOST, use_ssl=self.use_ssl, port=self.port, get_info=ALL)
|
||
c_auth = Connection(server=server, user=r'{}\{}'.format(self.domain, username), password=password, auto_bind=True, raise_exceptions=True)
|
||
c_auth.unbind()
|
||
return True, '旧密码验证通过。'
|
||
except LDAPInvalidCredentialsResult as e:
|
||
if '52e' in e.message:
|
||
return False, u'账号或旧密码不正确!'
|
||
elif '775' in e.message:
|
||
return False, u'账号已锁定,请自行扫码解锁!'
|
||
elif '533' in e.message:
|
||
return False, u'账号已禁用!'
|
||
elif '525' in e.message:
|
||
return False, u'账号不存在!'
|
||
elif '532' in e.message:
|
||
return False, u'密码己过期!'
|
||
elif '701' in e.message:
|
||
return False, u'账号己过期!'
|
||
elif '773' in e.message:
|
||
# 如果仅仅使用普通凭据来绑定ldap用途,请返回False, 让用户通过其他途径修改密码后再来验证登陆
|
||
# return False, '用户登陆前必须修改密码!'
|
||
# 设置该账号下次登陆不需要更改密码,再验证一次
|
||
self.conn.search(search_base=BASE_DN, search_filter='(sAMAccountName={}))'.format(username), attributes=['pwdLastSet'])
|
||
self.conn.modify(self.conn.entries[0].entry_dn, {'pwdLastSet': [(MODIFY_REPLACE, ['-1'])]})
|
||
return self.ad_auth_user(username, password)
|
||
else:
|
||
return False, u'旧密码认证失败,请确认账号的旧密码是否正确或使用重置密码功能。'
|
||
|
||
def ad_ensure_user_by_account(self, username):
|
||
"""
|
||
通过username查询某个用户是否在AD中
|
||
:param username:
|
||
:return: True or False
|
||
"""
|
||
base_dn = BASE_DN
|
||
condition = '(&(objectclass=user)(sAMAccountName={}))'.format(username)
|
||
attributes = ['sAMAccountName']
|
||
return self.conn.search(base_dn, condition, attributes=attributes)
|
||
|
||
def ad_get_user_displayname_by_account(self, username):
|
||
"""
|
||
通过username查询某个用户的显示名
|
||
:param username:
|
||
:return: user_displayname
|
||
"""
|
||
self.conn.search(BASE_DN, '(&(objectclass=user)(sAMAccountName={}))'.format(username), attributes=['name'])
|
||
try:
|
||
return True, self.conn.entries[0]['name']
|
||
except Exception as e:
|
||
return False, str(e)
|
||
|
||
def ad_get_user_dn_by_account(self, username):
|
||
"""
|
||
通过username查询某个用户的完整DN
|
||
:param username:
|
||
:return: DN
|
||
"""
|
||
self.conn.search(BASE_DN, '(&(objectclass=user)(sAMAccountName={}))'.format(username), attributes=['distinguishedName'])
|
||
return str(self.conn.entries[0]['distinguishedName'])
|
||
|
||
def ad_get_user_status_by_account(self, username):
|
||
"""
|
||
通过username查询某个用户的账号状态
|
||
:param username:
|
||
:return: user_account_control code
|
||
"""
|
||
self.conn.search(BASE_DN, '(&(objectclass=user)(sAMAccountName={}))'.format(username), attributes=['userAccountControl'])
|
||
return self.conn.entries[0]['userAccountControl']
|
||
|
||
def ad_unlock_user_by_account(self, username):
|
||
"""
|
||
通过username解锁某个用户
|
||
:param username:
|
||
:return:
|
||
"""
|
||
user_dn = self.ad_get_user_dn_by_account(username)
|
||
try:
|
||
return True, self.conn.extend.microsoft.unlock_account(user='%s' % user_dn)
|
||
except Exception as e:
|
||
return False, str(e)
|
||
|
||
def ad_reset_user_pwd_by_account(self, username, new_password):
|
||
"""
|
||
重置某个用户的密码
|
||
:param username:
|
||
:return:
|
||
"""
|
||
user_dn = self.ad_get_user_dn_by_account(username)
|
||
if self.conn.check_names:
|
||
user_dn = safe_dn(user_dn)
|
||
encoded_new_password = ('"%s"' % new_password).encode('utf-16-le')
|
||
result = self.conn.modify(user_dn,
|
||
{'unicodePwd': [(MODIFY_REPLACE, [encoded_new_password])]},
|
||
)
|
||
|
||
if not self.conn.strategy.sync:
|
||
_, result = self.conn.get_response(result)
|
||
else:
|
||
if self.conn.strategy.thread_safe:
|
||
_, result, _, _ = result
|
||
else:
|
||
result = self.conn.result
|
||
|
||
# change successful, returns True
|
||
if result['result'] == RESULT_SUCCESS:
|
||
return True, '密码己修改成功,请妥善保管!'
|
||
|
||
# change was not successful, raises exception if raise_exception = True in connection or returns the operation result, error code is in result['result']
|
||
if self.conn.raise_exceptions:
|
||
from ldap3.core.exceptions import LDAPOperationResult
|
||
_msg = LDAPOperationResult(result=result['result'], description=result['description'], dn=result['dn'], message=result['message'],
|
||
response_type=result['type'])
|
||
return False, _msg
|
||
return False, result['result']
|
||
|
||
def ad_get_user_locked_status_by_account(self, username):
|
||
"""
|
||
通过username获取某个用户账号是否被锁定
|
||
:param username:
|
||
:return: 如果结果是1601-01-01说明账号未锁定,返回0
|
||
"""
|
||
self.conn.search(BASE_DN, '(&(objectclass=user)(sAMAccountName={}))'.format(username), attributes=['lockoutTime'])
|
||
locked_status = self.conn.entries[0]['lockoutTime']
|
||
if '1601-01-01' in str(locked_status):
|
||
return 0
|
||
else:
|
||
return locked_status
|
||
|
||
|
||
if __name__ == '__main__':
|
||
# server = Server(host='%s' % AD_HOST, use_ssl=AD_USE_SSL, port=AD_CONN_PORT, get_info=ALL)
|
||
# conn = Connection(server, auto_bind=True, user=str(AD_LOGIN_USER).lower(), password=AD_LOGIN_USER_PWD, authentication=SIMPLE)
|
||
# # conn.bind()
|
||
# # conn.search(BASE_DN, '(&(objectclass=user)(sAMAccountName=xiangle))', attributes=['name'])
|
||
# # print(conn.entries[0])
|
||
# print(conn.result)
|
||
|
||
# conn = _ad_connect()
|
||
user = 'zhangsan'
|
||
old_password = 'K2dhhuT1Zf11111cnJ1ollC3y'
|
||
# old_password = 'L1qyrmZDUFeYW1OIualjlNhr4'
|
||
new_password = 'K2dhhuT1Zf11111cnJ1ollC3y'
|
||
ad_ops = AdOps()
|
||
# ad_ops = AdOps(user=user, password=old_password)
|
||
status, msg = ad_ops.ad_auth_user(username=user, password=old_password)
|
||
print(msg)
|
||
if status:
|
||
res = ad_ops.ad_reset_user_pwd_by_account(user, new_password)
|
||
print(res)
|