Endpoints
Public and internal connection targets for external product testing and in-cluster troubleshooting.
Active OUs
AD layout is intentionally compact: one lab OU, one user OU, one group OU, and one service account OU.
Test Users
Public inventory only. Passwords are intentionally redacted on the web page.
| Username | Password | Full Name | Search Base |
|---|---|---|---|
| lab.hannah | [REDACTED] | Hannah Harbor | OU=Users,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud |
| eng.fry | [REDACTED] | Philip Fry | OU=Users,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud |
| ops.leela | [REDACTED] | Turanga Leela | OU=Users,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud |
| qa.amy | [REDACTED] | Amy Wong | OU=Users,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud |
| ro.lucas | [REDACTED] | Lucas Light | OU=Users,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud |
| svc.harborbind | [REDACTED] | Harbor Bind | OU=Service Accounts,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud |
Group Layout
This sandbox intentionally includes both direct and nested AD group cases for Harbor and MSR authorization testing.
| Group | Scope | Members / Purpose |
|---|---|---|
| CN=GG-Harbor-DirectUser,OU=Groups,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud | Global | lab.hannah direct membership repro |
| CN=DL-Harbor-DirectUser,OU=Groups,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud | Domain Local | lab.hannah direct membership repro |
| CN=GG-Harbor-NestedSource,OU=Groups,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud | Global | lab.hannah nested source |
| CN=DL-Harbor-NestedTarget,OU=Groups,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud | Domain Local | contains GG-Harbor-NestedSource |
| CN=DL-MSR-ProjectA,OU=Groups,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud | Domain Local | contains GG-Engineering and GG-Harbor-NestedSource |
| CN=DL-MSR-ProjectB,OU=Groups,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud | Domain Local | ops.leela direct membership |
Harbor Repro
The seeded `lab.hannah` user is present in one Global group, one Domain Local group, and one nested Global-to-Domain-Local chain.
memberOf should show GG-Harbor-DirectUser and DL-Harbor-DirectUser. DL-Harbor-NestedTarget is the AD-specific nested case that may diverge if an app does direct LDAP comparison instead of AD transitive evaluation.
LDAP Queries
Use these to compare what the directory exposes versus what the application actually authorizes.
ldapsearch -x -H ldaps://ad-sandbox.samkhya.cloud:636 \ -D "svc.harborbind@ad-sandbox.samkhya.cloud" \ -w '[REDACTED]' \ -b "DC=ad-sandbox,DC=samkhya,DC=cloud" \ "(&(objectClass=user)(sAMAccountName=lab.hannah))" \ distinguishedName memberOf
ldapsearch -x -H ldaps://ad-sandbox.samkhya.cloud:636 \ -D "svc.harborbind@ad-sandbox.samkhya.cloud" \ -w '[REDACTED]' \ -b "OU=Groups,OU=Lab,DC=ad-sandbox,DC=samkhya,DC=cloud" \ "(&(objectClass=group)(|(cn=GG-Harbor-DirectUser)(cn=DL-Harbor-DirectUser)(cn=DL-Harbor-NestedTarget)))" \ cn member groupType