No success. I'm wondering if this config file is enough for proper LDAP authentication. One thing I want is to enter user name and password and then CAS msg logged in.
wtorek, 2 marca 2021 o 11:30:16 UTC+1 leleuj napisał(a): > Hi, > > It looks like: *cas.authn.ldap[0].dn-format: '%s@domain'* > Thanks. > Best regards, > Jérôme > > > Le mar. 2 mars 2021 à 10:13, Bartosz Nitkiewicz <[email protected]> a > écrit : > >> Could you please tell me how it should looks like? >> >> wtorek, 2 marca 2021 o 10:09:05 UTC+1 leleuj napisał(a): >> >>> Hi, >>> >>> I checked an AD configuration I have and there is also a >>> *cas.authn.ldap[0].dn-format* property I don't see in your >>> configuration. >>> Thanks. >>> Best regards, >>> Jérôme >>> >>> >>> Le mar. 2 mars 2021 à 10:01, Bartosz Nitkiewicz <[email protected]> >>> a écrit : >>> >>>> Checked. Doesn't work either :( >>>> >>>> wtorek, 2 marca 2021 o 09:57:10 UTC+1 leleuj napisał(a): >>>> >>>>> Hi, >>>>> >>>>> For the AD LDAP, your type property should be AD: >>>>> >>>>> cas.authn.ldap[0].type=AD >>>>> >>>>> >>>>> Thanks. >>>>> Best regards, >>>>> Jérôme >>>>> >>>>> >>>>> >>>>> Le mar. 2 mars 2021 à 09:43, Bartosz Nitkiewicz <[email protected]> >>>>> a écrit : >>>>> >>>>>> Hello. >>>>>> I need your help. I'm trying to use CAS as authentication service for >>>>>> some of my applications. There are user names and passwords stored in AD >>>>>> (LDAP) server. I can't make CAS to authenticate users through LDAP. I >>>>>> have >>>>>> read all documentation an this ML, found some configs and I tried almost >>>>>> everything. Could someone look at my simple cas.properties and tell me >>>>>> if >>>>>> it looks ok? >>>>>> >>>>>> cas.server.name: https://localhost:8443 >>>>>> cas.server.prefix: ${cas.server.name}/cas >>>>>> >>>>>> cas.authn.accept.enabled=false >>>>>> >>>>>> cas.authn.policy.any.try-all=false >>>>>> cas.authn.policy.any.enabled=true >>>>>> >>>>>> cas.authn.ldap[0].type=AUTHENTICATED >>>>>> cas.authn.ldap[0].ldap-url=ldaps://ldpadomainname.org >>>>>> cas.authn.ldap[0].base-dn=OU=TEST,dc=test,dc=test,dc=test,dc=org >>>>>> cas.authn.ldap[0].subtree-search=true >>>>>> >>>>>> >>>>>> cas.authn.ldap[0].searchFilter=(&(objectclass=*)(sAMAccountName={user})) >>>>>> >>>>>> >>>>>> cas.authn.ldap[0].bind-dn=cn=testaccount,cn=group,dc=test,dc=test,dc=test,dc=com >>>>>> cas.authn.ldap[0].bind-credential=password >>>>>> >>>>>> cas.authn.ldap[0].keystore=file:/etc/cas/config/thekeystore >>>>>> cas.authn.ldap[0].keystorePassword=asd123456 >>>>>> cas.authn.ldap[0].keystoreType=PKCS12 >>>>>> >>>>>> ldapsearch form commandline works fine. I can filter LDAP tree to >>>>>> find proper username. >>>>>> >>>>>> Thanks in advance. >>>>>> >>>>>> -- >>>>>> - Website: https://apereo.github.io/cas >>>>>> - Gitter Chatroom: https://gitter.im/apereo/cas >>>>>> - List Guidelines: https://goo.gl/1VRrw7 >>>>>> - Contributions: https://goo.gl/mh7qDG >>>>>> --- >>>>>> You received this message because you are subscribed to the Google >>>>>> Groups "CAS Community" group. >>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>> send an email to [email protected]. >>>>>> To view this discussion on the web visit >>>>>> https://groups.google.com/a/apereo.org/d/msgid/cas-user/88e9b773-d5df-4b8f-ae1e-4b299840d479n%40apereo.org >>>>>> >>>>>> <https://groups.google.com/a/apereo.org/d/msgid/cas-user/88e9b773-d5df-4b8f-ae1e-4b299840d479n%40apereo.org?utm_medium=email&utm_source=footer> >>>>>> . >>>>>> >>>>> -- - Website: https://apereo.github.io/cas - Gitter Chatroom: https://gitter.im/apereo/cas - List Guidelines: https://goo.gl/1VRrw7 - Contributions: https://goo.gl/mh7qDG --- You received this message because you are subscribed to the Google Groups "CAS Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-user/8cba1856-af13-4e40-8f92-8dd0a911c08an%40apereo.org.
