1. In this example, the user “valeriyp” is the member of the group “support” logs in to the JFrog Platform.
The flow in Wireshark UI:
In this example we can see:
1. Successful user searchRequest that returned “valeriyp” user DN
1 0.000000 10.132.0.88 10.166.0.2 LDAP 134 searchRequest(13) "ou=Users,dc=test,dc=com" wholeSubtree
2 0.035437 10.166.0.2 10.132.0.88 LDAP 398 searchResEntry(13) "cn=Valeriy Petrov,ou=Users,dc=test,dc=com"
2. Successful user bindRequest with cn=Valeriy Petrov,ou=Users,dc=test,dc=com and “simple” (masked password). To reveal the password, inspect the raw data of this packet, in Wireshark UI.
9 0.073018 10.132.0.88 10.166.0.2 LDAP 131 bindRequest(1) "cn=Valeriy Petrov,ou=Users,dc=test,dc=com" simple
11 0.105634 10.166.0.2 10.132.0.88 LDAP 82 bindResponse(1) success
3. Successful group searchRequest
15 0.129357 10.132.0.88 10.166.0.2 LDAP 435 searchRequest(14) "ou=Groups,dc=test,dc=com" wholeSubtree
19 0.162667 10.166.0.2 10.132.0.88 LDAP 224 searchResEntry(14) "cn=support,ou=Groups,dc=test,dc=com"