Hi Chinzorig,
I have disabled the Static users still it is not working.Please can you see
the below attachment of my LDAP Setting and i will be thankful to you if
you help me with my errors in LDAP setting
On Wed, Jan 25, 2017 at 9:46 PM, Tsogbadrakh Chinzorig <
[email protected]> wrote:
> set cas cas.properties
> # Disabling static users
> cas.authn.accept.users=
> # And add your LDAP settings
>
> --
> - CAS gitter chatroom: https://gitter.im/apereo/cas
> - CAS mailing list guidelines: https://apereo.github.io/cas/M
> ailing-Lists.html
> - CAS documentation website: https://apereo.github.io/cas
> - CAS project website: https://github.com/apereo/cas
> ---
> You received this message because you are subscribed to the Google Groups
> "CAS Community" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit https://groups.google.com/a/ap
> ereo.org/d/msgid/cas-user/96f3785c-0680-4eac-97b2-9909371d09
> c7%40apereo.org
> <https://groups.google.com/a/apereo.org/d/msgid/cas-user/96f3785c-0680-4eac-97b2-9909371d09c7%40apereo.org?utm_medium=email&utm_source=footer>
> .
>
--
Thanks&Regards
Sravani
--
- CAS gitter chatroom: https://gitter.im/apereo/cas
- CAS mailing list guidelines: https://apereo.github.io/cas/Mailing-Lists.html
- CAS documentation website: https://apereo.github.io/cas
- CAS project website: https://github.com/apereo/cas
---
You received this message because you are subscribed to the Google Groups "CAS
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/apereo.org/d/msgid/cas-user/CABdzCWQUVr_uMJ30osABgmSZevOf7uS60wPyPWV3-M1CjZrT6Q%40mail.gmail.com.
# General properties
#
cas.authn.attributeRepository.ldap.ldapUrl=ldaps://esitdir.gfs.com:636
cas.authn.attributeRepository.ldap.useSsl=true
cas.authn.attributeRepository.ldap.useStartTls=false
cas.authn.attributeRepository.ldap.connectTimeout=3000
cas.authn.attributeRepository.ldap.baseDn=o=gfs
cas.authn.attributeRepository.ldap.userFilter=gfsusername={0}
cas.authn.attributeRepository.ldap.subtreeSearch=true
cas.authn.attributeRepository.ldap.bindDn=uid=experienceauthuser,ou=special
users,o=gfs
cas.authn.attributeRepository.ldap.bindCredential=P0rtal4Experience
cas.authn.attributeRepository.ldap.trustCertificates=
cas.authn.attributeRepository.ldap.keystore=
cas.authn.attributeRepository.ldap.keystorePassword=
cas.authn.attributeRepository.ldap.keystoreType=JKS|JCEKS|PKCS12
cas.authn.attributeRepository.ldap.minPoolSize=1
cas.authn.attributeRepository.ldap.maxPoolSize=10
cas.authn.attributeRepository.ldap.validateOnCheckout=true
cas.authn.attributeRepository.ldap.validatePeriodically=true
cas.authn.attributeRepository.ldap.validatePeriod=300
cas.authn.attributeRepository.ldap.failFast=true
cas.authn.attributeRepository.ldap.idleTime=500
cas.authn.attributeRepository.ldap.prunePeriod=600
cas.authn.attributeRepository.ldap.blockWaitTime=3000
cas.authn.attributeRepository.ldap.providerClass=org.ldaptive.provider.unboundid.UnboundIDProvider
cas.authn.ldap[0].type=ANONYMOUS
cas.authn.ldap[0].ldapUrl=ldaps://esitdir.gfs.com:636
cas.authn.ldap[0].useSsl=true
cas.authn.ldap[0].useStartTls=false
cas.authn.ldap[0].connectTimeout=5000
cas.authn.ldap[0].baseDn=o=gfs
cas.authn.ldap[0].userFilter=gfsusername={user}
cas.authn.ldap[0].subtreeSearch=true
cas.authn.ldap[0].usePasswordPolicy=false
cas.authn.ldap[0].bindDn=uid=experienceauthuser,ou=special users,o=gfs
cas.authn.ldap[0].bindCredential=P0rtal4Experience
cas.authn.ldap[0].enhanceWithEntryResolver=false
cas.authn.ldap[0].dnFormat=uid=%s,ou=people,ou=extranet,o=gfs
cas.authn.ldap[0].principalAttributeId=gfsusername
cas.authn.ldap[0].principalAttributePassword=userPassword
cas.authn.ldap[0].principalAttributeList=sn,cn,givenName,gfsusername,uid,preferredlanguage,gfscustomerbusinessunitid,gfscustomerchannelid
cas.authn.ldap[0].allowMultiplePrincipalAttributeValues=false
cas.authn.ldap[0].additionalAttributes=
cas.authn.ldap[0].credentialCriteria=
#cas.authn.ldap[0].saslMechanism=GSSAPI|DIGEST_MD5|CRAM_MD5|EXTERNAL
#cas.authn.ldap[0].saslRealm=EXAMPLE.COM
#cas.authn.ldap[0].saslAuthorizationId=
#cas.authn.ldap[0].saslMutualAuth=
#cas.authn.ldap[0].saslQualityOfProtection=
#cas.authn.ldap[0].saslSecurityStrength=
#cas.authn.ldap[0].trustCertificates=
#cas.authn.ldap[0].keystore=
#cas.authn.ldap[0].keystorePassword=
#cas.authn.ldap[0].keystoreType=JKS|JCEKS|PKCS12
cas.authn.ldap[0].minPoolSize=3
cas.authn.ldap[0].maxPoolSize=10
cas.authn.ldap[0].validateOnCheckout=true
cas.authn.ldap[0].validatePeriodically=true
cas.authn.ldap[0].validatePeriod=600
cas.authn.ldap[0].failFast=true
cas.authn.ldap[0].idleTime=5000
cas.authn.ldap[0].prunePeriod=5000
cas.authn.ldap[0].blockWaitTime=5000
cas.authn.ldap[0].providerClass=org.ldaptive.provider.unboundid.UnboundIDProvider
cas.authn.ldap[0].allowMultipleDns=false
#cas.authn.ldap[0].passwordEncoder.type=NONE
# cas.authn.ldap[0].passwordEncoder.characterEncoding=
# cas.authn.ldap[0].passwordEncoder.encodingAlgorithm=
# cas.authn.ldap[0].passwordEncoder.secret=
# cas.authn.ldap[0].passwordEncoder.strength=16
#cas.authn.ldap[0].principalTransformation.suffix=
#cas.authn.ldap[0].principalTransformation.caseConversion=NONE
#cas.authn.ldap[0].principalTransformation.prefix=
# cas.authn.ldap[0].passwordPolicy.enabled=true
#
cas.authn.ldap[0].passwordPolicy.policyAttributes.accountLocked=javax.security.auth.login.AccountLockedException
# cas.authn.ldap[0].passwordPolicy.loginFailures=5
# cas.authn.ldap[0].passwordPolicy.warningAttributeValue=
# cas.authn.ldap[0].passwordPolicy.warningAttributeName=
# cas.authn.ldap[0].passwordPolicy.displayWarningOnMatch=true
# cas.authn.ldap[0].passwordPolicy.warnAll=true
# cas.authn.ldap[0].passwordPolicy.warningDays=30
# cas.authn.ldap[0].passwordPolicy.url=https://password.example.edu/change
# Define the thread pool that will ping on the LDAP connection pool.
cas.monitor.ldap.pool.suspension=false
cas.monitor.ldap.pool.minSize=6
cas.monitor.ldap.pool.maxSize=18
cas.monitor.ldap.pool.maxIdleTime=1000
cas.monitor.ldap.pool.maxWait=2000
cas.monitor.ldap.maxWait=5000
# Define the LDAP connection pool settings for monitoring
cas.monitor.ldap.ldapUrl=ldaps://esitdir.gfs.com:636
cas.monitor.ldap.baseDn=ou=special users,o=gfs
cas.monitor.ldap.userFilter=uid={user}
cas.monitor.ldap.bindDn=uid=experienceauthuser,ou=special users,o=gfs
cas.monitor.ldap.bindCredential=P0rtal4Experience
cas.monitor.ldap.providerClass=org.ldaptive.provider.unboundid.UnboundIDProvider
cas.monitor.ldap.connectTimeout=5000
# cas.monitor.ldap.trustCertificates=
# cas.monitor.ldap.keystore=
# cas.monitor.ldap.keystorePassword=
# cas.monitor.ldap.keystoreType=JKS|JCEKS|PKCS12
cas.monitor.ldap.minPoolSize=3
cas.monitor.ldap.maxPoolSize=10
cas.monitor.ldap.validateOnCheckout=true
cas.monitor.ldap.validatePeriodically=true
cas.monitor.ldap.validatePeriod=600
cas.monitor.ldap.failFast=true
cas.monitor.ldap.idleTime=500
cas.monitor.ldap.prunePeriod=600
cas.monitor.ldap.blockWaitTime=5000
cas.monitor.ldap.subtreeSearch=true
cas.monitor.ldap.useSsl=true
cas.monitor.ldap.useStartTls=false
cas.serviceRegistry.ldap.serviceDefinitionAttribute=description
cas.serviceRegistry.ldap.idAttribute=uid
cas.serviceRegistry.ldap.objectClass=casRegisteredService
cas.serviceRegistry.ldap.ldapUrl=ldaps://esitdir.gfs.com:636
cas.serviceRegistry.ldap.baseDn=ou=special users,o=gfs
cas.serviceRegistry.ldap.bindDn=uid=experienceauthuser,ou=special users,o=gfs
cas.serviceRegistry.ldap.bindCredential=P0rtal4Experience
cas.serviceRegistry.ldap.providerClass=org.ldaptive.provider.unboundid.UnboundIDProvider
cas.serviceRegistry.ldap.connectTimeout=5000
# cas.serviceRegistry.ldap.trustCertificates=
# cas.serviceRegistry.ldap.keystore=
# cas.serviceRegistry.ldap.keystorePassword=
# cas.serviceRegistry.ldap.keystoreType=JKS|JCEKS|PKCS12
cas.serviceRegistry.ldap.minPoolSize=3
cas.serviceRegistry.ldap.maxPoolSize=10
cas.serviceRegistry.ldap.validateOnCheckout=true
cas.serviceRegistry.ldap.validatePeriodically=true
cas.serviceRegistry.ldap.validatePeriod=600
cas.serviceRegistry.ldap.failFast=true
cas.serviceRegistry.ldap.idleTime=500
cas.serviceRegistry.ldap.prunePeriod=600
cas.serviceRegistry.ldap.blockWaitTime=5000
cas.serviceRegistry.ldap.useSsl=true
cas.serviceRegistry.ldap.useStartTls=false