That's right. I have found it 2 hours before you replay to this post ;)
It's about releasing sAMAccountName as domain\sAMAccountName done with inline
groovy script.
Than you once again.
Regards
BN
--
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List
If I'm understanding you correctly, I've never done it that way.
You are saying that you have an attribute already setup called sAMAccountName
right? And you want to release it to this system as domain\sAMAcountName as
userID?
I've always done such a thing via Groovy attribute return with
Bartosz Nitkiewicz
I am using AJP connection between Apache2 and tomcat9.
Apache 2 is the front with TLS connetion.
Le lundi 22 mars 2021 à 17:09:55 UTC+1, Bartosz Nitkiewicz a écrit :
> Shouldn't you add keystore for SSL/TLS authentication?
> like:
>
>
Shouldn't you add keystore for SSL/TLS authentication?
like:
cas.authn.ldap[0].keystore=file:/etc/cas/config/keystore.jks
cas.authn.ldap[0].keystorePassword=password
cas.authn.ldap[0].keystoreType=PKCS12
You should add your signed certificate to main JAVA keystore
poniedziałek, 22 marca 2021 o
This is of course not "patternFormat": "domail\\{0}", but "patternFormat":
"domain\\{0}",
poniedziałek, 22 marca 2021 o 17:03:03 UTC+1 Bartosz Nitkiewicz napisał(a):
> I'm still trying to use CAS as SAML authenticator for my service desk plus
> app. Username has to be in format: domain\user
>
I'm still trying to use CAS as SAML authenticator for my service desk plus
app. Username has to be in format: domain\user
I want use my LDAP sAMAccountName as user but I don't know how to prepare
regexp to domain\sAMAccountName. I have read
Yes I am using Start-tls
cas.authn.ldap[0].use-start-tls=true
Le lundi 22 mars 2021 à 16:53:36 UTC+1, Bartosz Nitkiewicz a écrit :
> Maybe your LDAP server have to be authenticated through SSL/TLS (LDAPS)?
>
> poniedziałek, 22 marca 2021 o 16:25:41 UTC+1 Jérémie Pilette napisał(a):
>
>> It seems
It doesn't change anything with this two lines added ... :o(
Le lundi 22 mars 2021 à 16:17:58 UTC+1, Bartosz Nitkiewicz a écrit :
> implementation is ok
>
> Try to add
> cas.authn.ldap[0].name=adYourName
> cas.authn.ldap[0].order=0
>
> poniedziałek, 22 marca 2021 o 16:13:17 UTC+1 Jérémie
Here my log from tomcat : catalina.out
[2021-03-22 16:17:01] [info] #033[32m2021-03-22 16:17:01,729 INFO
[org.apereo.cas.authentication.DefaultAuthenticationManager] -
<[LdapAuthenticationHandler] exception details: [Invalid
credentials].>#033[m
[2021-03-22 16:17:01] [info] #033[32m2021-03-22
implementation is ok
Try to add
cas.authn.ldap[0].name=adYourName
cas.authn.ldap[0].order=0
poniedziałek, 22 marca 2021 o 16:13:17 UTC+1 Jérémie Pilette napisał(a):
>
> Yes I have :
> compile "org.apereo.cas:cas-server-support-ldap:${project.'cas.version'}"
>
> But i have seen that instead of
Here my cas.properties
***
cas.server.name=https://x.x.fr
cas.server.prefix=${cas.server.name}/cas
logging.config=file:/etc/cas/config/log4j2.xml
cas.service-registry.json.location=file:/etc/cas/services
cas.authn.ldap[0].principal-attribute-list=cn,givenName,sn
#
Hi,
I have just install the CAS server version 6.4 and made my LDAP
configuration.
Impossible for users to authenticate.
Maybe I forget something... I do not know what...
Do you have an idea please ?
--
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
-
12 matches
Mail list logo