Unable to create Org with external LDAP authentication enabled.

I am trying to create an org in an instance which is integrated with external LDAP. my config file contains the below details as per doc.

ADMIN_EMAIL="abc@myCo.com" #sysadmin email which is a valid user in ldap

APIGEE_ADMINPW="password #ldap password for abc user

ORG_NAME=example # lowercase only, no spaces, underscores, or periods.

ORG_ADMIN=orgAdmin@myCo.com

But on executing the command I get 401 error.

/opt/apigee/apigee-service/bin/apigee-service apigee-provision create-org -f configFile

Checking for optional variables

Found optional variable APIGEE_ADMINPW...OK

Found optional variable APIGEE_PORT_HTTP_MS...OK

Found optional variable ORG_ADMIN...OK

!!!!Error !!!!

HTTP STATUS CODE: 401

ERROR: Creating organization pd failed.

I have also tried with

ADMIN_EMAIL=as LDAP SAMUER which is not email id , that too did not work.

Please let me know how I can make this work and if I am missing any step here.

Solved Solved
0 6 284
1 ACCEPTED SOLUTION

Need to set the field IS_EXTERNAL_AUTH in config file to make this work.

View solution in original post

6 REPLIES 6

Able to create org/env with API calls but not with apigee provision utility. Not sure why the utility is failing to provision an org.

apigee provision to provision org worked perfectly by disabling the external LDAP authentication.

But that does not seems to be ideal as I don't want to disable my external LDAP authentication everytime I need to execute apigee provision.

Is it a bug or am I missing some property that needs to be set.

@rajeshmishra

Any suggestion?

Are you sure your external LDAP is properly setup? When you enabled LDAP, does the curl command to management server with ADMIN_EMAIL and APIGEE_ADMINPW works?

This is not a known issue. I will verify from my side.

Thanks Rajesh. Yes , external LDAP works fine as we are able to login to APIGEE edge with external LDAP authentication but not able to execute apigee-provision command with the same. The curl command works fine too with sysadmin username:password

Need to set the field IS_EXTERNAL_AUTH in config file to make this work.