print "Performs a password cleartext change operation on 'userPassword'"
# Notice: This works only against Windows if "dSHeuristics" has been set
# properly
+ creds = self.creds2
+ username = creds.get_username()
+ userdn = "cn=%s,cn=users,%s" % (username, self.base_dn)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=("greater", 0),
lastLogon=('greater', 0),
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1x
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# Correct old password
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1
userPassword: thatsAcomplPASS2
""")
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1x
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1x
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1x
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1x
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lockoutTime=lockoutTime,
try:
# Correct old password
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS2
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Now reset the password, which does NOT change the lockout!
self.ldb.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
replace: userPassword
userPassword: thatsAcomplPASS2
""")
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
try:
# Correct old password
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS2
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
msDSUserAccountControlComputed=dsdb.UF_LOCKOUT)
m = Message()
- m.dn = Dn(self.ldb, "cn=testuser,cn=users," + self.base_dn)
+ m.dn = Dn(self.ldb, userdn)
m["userAccountControl"] = MessageElement(
str(dsdb.UF_LOCKOUT),
FLAG_MOD_REPLACE, "userAccountControl")
self.ldb.modify(m)
# This shows that setting the UF_LOCKOUT flag alone makes no difference
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
try:
# Correct old password
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS2\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lockoutTime=lockoutTime,
self._reset_by_method(res, method)
# Here bad password counts are reset without logon success.
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lockoutTime=0,
# The correct password after doing the unlock
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS2\"".encode('utf-16-le')) + """
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS2x\"".encode('utf-16-le')) + """
""")
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lockoutTime=0,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1xyz
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lockoutTime=0,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: userPassword
userPassword: thatsAcomplPASS1xyz
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=("greater", badPasswordTime),
lockoutTime=0,
self._reset_ldap_lockoutTime(res)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
def test_unicodePwd_lockout_with_clear_change(self):
print "Performs a password cleartext change operation on 'unicodePwd'"
+ creds = self.creds2
+ username = creds.get_username()
+ userdn = "cn=%s,cn=users,%s" % (username, self.base_dn)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=("greater", 0),
lastLogon=("greater", 0),
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1x\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# Correct old password
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1\"".encode('utf-16-le')) + """
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS2\"".encode('utf-16-le')) + """
""")
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# reset "badPwdCount" = 0.
self._reset_samr(res)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1x\"".encode('utf-16-le')) + """
self.assertTrue('00000056' in msg, msg)
# this is strange, why do we have lockoutTime=badPasswordTime here?
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1x\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1x\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
try:
# Correct old password
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS2\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000775' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Now reset the lockout, by removing ACB_AUTOLOCK (which removes the lock, despite being a generated attribute)
self._reset_samr(res);
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Correct old password
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS2\"".encode('utf-16-le')) + """
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS2x\"".encode('utf-16-le')) + """
""")
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1x\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1x\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# It doesn't reset "badPwdCount" = 0.
self._reset_samr(res)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# Wrong old password
try:
self.ldb3.modify_ldif("""
-dn: cn=testuser,cn=users,""" + self.base_dn + """
+dn: """ + userdn + """
changetype: modify
delete: unicodePwd
unicodePwd:: """ + base64.b64encode("\"thatsAcomplPASS1x\"".encode('utf-16-le')) + """
self.assertEquals(num, ERR_CONSTRAINT_VIOLATION)
self.assertTrue('00000056' in msg, msg)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
time.sleep(self.account_lockout_duration + 1)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3, effective_bad_password_count=0,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
# reset "badPwdCount" = 0.
self._reset_samr(res)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3, effective_bad_password_count=0,
badPasswordTime=badPasswordTime,
lockoutTime=lockoutTime,
msDSUserAccountControlComputed=0)
def _test_login_lockout(self, use_kerberos):
+ creds = self.creds2
+ username = creds.get_username()
+ userdn = "cn=%s,cn=users,%s" % (username, self.base_dn)
+
# This unlocks by waiting for account_lockout_duration
if use_kerberos == MUST_USE_KERBEROS:
lastlogon_relation = 'greater'
print "Performs a lockout attempt against LDAP using NTLM"
# Change password on a connection as another user
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=("greater", 0),
lastLogon=("greater", 0),
# Open a second LDB connection with the user credentials. Use the
# command line credentials for informations like the domain, the realm
# and the workstation.
- creds_lockout = insta_creds()
+ creds_lockout = insta_creds(template=creds)
creds_lockout.set_kerberos_state(use_kerberos)
# The wrong password
self.assertLoginFailure(host_url, creds_lockout, lp)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
# lastLogonTimestamp should not change
# lastLogon increases if badPwdCount is non-zero (!)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lastLogon=('greater', lastLogon),
self.assertLoginFailure(host_url, creds_lockout, lp)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=("greater", badPasswordTime),
lastLogon=lastLogon,
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3,
badPasswordTime=badPasswordTime,
lastLogon=lastLogon,
time.sleep(self.account_lockout_duration + 1)
print self.account_lockout_duration + 1
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=3, effective_bad_password_count=0,
badPasswordTime=badPasswordTime,
lockoutTime=lockoutTime,
ldb_lockout = SamDB(url=host_url, credentials=creds_lockout2, lp=lp)
time.sleep(3)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lastLogon=(lastlogon_relation, lastLogon),
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lockoutTime=0,
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2,
badPasswordTime=("greater", badPasswordTime),
lockoutTime=0,
time.sleep(self.lockout_observation_window + 1)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=2, effective_bad_password_count=0,
badPasswordTime=badPasswordTime,
lockoutTime=0,
except LdbError, (num, msg):
self.assertEquals(num, ERR_INVALID_CREDENTIALS)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=1,
badPasswordTime=("greater", badPasswordTime),
lockoutTime=0,
creds_lockout.set_password("thatsAcomplPASS1")
ldb_lockout = SamDB(url=host_url, credentials=creds_lockout, lp=lp)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lockoutTime=0,
# Open a second LDB connection with the user credentials. Use the
# command line credentials for informations like the domain, the realm
# and the workstation.
- creds2 = insta_creds()
+ creds = self.creds2
+ username = creds.get_username()
+ userdn = "cn=%s,cn=users,%s" % (username, self.base_dn)
+ creds2 = insta_creds(template=creds)
creds2.set_kerberos_state(use_kerberos)
self.assertEqual(creds2.get_kerberos_state(), use_kerberos)
SamDB(url=host_url, credentials=insta_creds(creds2), lp=lp)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=("greater", 0),
lastLogon=("greater", 0),
time.sleep(1)
SamDB(url=host_url, credentials=insta_creds(creds2), lp=lp)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lastLogon=(lastlogon_relation, lastLogon),
SamDB(url=host_url, credentials=insta_creds(creds2), lp=lp)
- res = self._check_account("cn=testuser,cn=users," + self.base_dn,
+ res = self._check_account(userdn,
badPwdCount=0,
badPasswordTime=badPasswordTime,
lastLogon=(lastlogon_relation, lastLogon),