It's hard to identify a specific cause without more information, but there
are some things to pursue. First, what exact version of CAS are you using?

You say groups but your example shows OUs (organizational units). They are
very different things. That's going to lead to some confusion.

Your example uses 'ldap[1]'. Should that be 'ldap[0]' or do you really have
another ldap configuration in addition to this one? (those arrays are 0
based)

I suspect the dnFormat will not be your best choice. That would require
having a single predictable format, which does not seem to be the case for
you. You will likely be more successful using a bind/query/bind approach
where CAS first binds as a known user, uses a filter to find the entry for
the provided user and then attempts a bind as that retrieved DN with the
provided password. Use the bindDn and bindCredential from here:

https://apereo.github.io/cas/5.3.x/installation/Configuration-Properties-Common.html#ldap-connection-settings

With the baseDn and searchFilter from here:

https://apereo.github.io/cas/5.3.x/installation/Configuration-Properties-Common.html#ldap-authenticationsearch-settings

If you really want to stick with the single bind attempt using a fixed DN
string, you may be able to use AD's support for the 'user@domain' style
DNs. You could try something like '%[email protected]'. But I think the
bind/query/bind is much better.

-dirk



On Wed, Nov 14, 2018 at 3:42 PM Zach Tackett <[email protected]> wrote:

> We have several AD groups within the root IDM group, is there a way to
> wildcard those nested groups (IDM-BANNER, IDM-FINAID) and have them
> authenticate or will indexes need to be created for each nested group?
>
> On Wednesday, November 14, 2018 at 3:14:02 PM UTC-5, Zach Tackett wrote:
>>
>> So we need to allow users to login to our LDAP/CAS 5.0 server from their
>> respective AD groups, there is a root group called "IDM", and within it are
>> groups called IDM-BANNER, IDM-FINAID,
>>
>> I have tried the following:
>>
>> cas.authn.ldap[1].dnFormat=cn=%s,ou=IDM,dc=marshall,dc=edu
>> cas.authn.ldap[1].dnFormat=cn=%s,ou=IDM,ou=IDM-FINAID,dc=marshall,dc=edu
>> cas.authn.ldap[1].dnFormat=cn=%s,ou=IDM-FINAID,dc=marshall,dc=edu
>> cas.authn.ldap[1].dnFormat=cn=%s,ou=IDM,ou=IDM-BANNER,dc=marshall,dc=edu
>> cas.authn.ldap[1].dnFormat=cn=%s,ou=IDM-BANNER,dc=marshall,dc=edu
>>
>> None of which are working. Can OU's be grouped/nested within the listing,
>> does CAS/LDAP not like the nested AD groups?
>>
>>
>> --
> - Website: https://apereo.github.io/cas
> - Gitter Chatroom: https://gitter.im/apereo/cas
> - List Guidelines: https://goo.gl/1VRrw7
> - Contributions: https://goo.gl/mh7qDG
> ---
> You received this message because you are subscribed to the Google Groups
> "CAS Community" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/apereo.org/d/msgid/cas-user/a502221e-e62a-4292-828b-e9da684cc3d4%40apereo.org
> <https://groups.google.com/a/apereo.org/d/msgid/cas-user/a502221e-e62a-4292-828b-e9da684cc3d4%40apereo.org?utm_medium=email&utm_source=footer>
> .
>

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/CAJ%3D0EZwh23g41WMivP2sXDChGcuG8j93x_Tg0%2BQua3HhWqQwPg%40mail.gmail.com.

Reply via email to