Binding to the Uni LDAP server currently does not require the TLS certificate to be valid. This is a security issue, because any attacker could just Man-in-the-Middle the connection and eavesdrop on all sent usernames and passwords.
Make sure that you have the `uni_root_ca.pem` file available in the directory you have spawned the shell in. You can ensure this using:
I currently discourage using the Uni LDAP server, until I have figured out a better way to do this.
Iff `success`, the user provided the correct username and password.
The return value will be `True` if and only if the user provided the correct username and password.
The Portal implementation [provides an alternative way](https://gitlab.cl.uni-heidelberg.de/fachschaft/portal/-/blob/7018a073252860493fa2b2a0c62743e4bcb12ee8/ldap/Directory.py#L62) using context managers.