That's right. I have found it 2 hours before you replay to this post ;)
It's about releasing sAMAccountName as domain\sAMAccountName done with inline
groovy script.
Than you once again.
Regards
BN
--
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List
If I'm understanding you correctly, I've never done it that way.
You are saying that you have an attribute already setup called sAMAccountName
right? And you want to release it to this system as domain\sAMAcountName as
userID?
I've always done such a thing via Groovy attribute return with
This is of course not "patternFormat": "domail\\{0}", but "patternFormat":
"domain\\{0}",
poniedziałek, 22 marca 2021 o 17:03:03 UTC+1 Bartosz Nitkiewicz napisał(a):
> I'm still trying to use CAS as SAML authenticator for my service desk plus
> app. Username has to be in format: domain\user
>
I'm still trying to use CAS as SAML authenticator for my service desk plus
app. Username has to be in format: domain\user
I want use my LDAP sAMAccountName as user but I don't know how to prepare
regexp to domain\sAMAccountName. I have read
Ok, so
https://apereo.github.io/cas/6.3.x/integration/Attribute-Definitions.html#pattern-formats
would be ok.
How to setup CAS to pass desire attribute?
I have this in my app.json. Is it ok?
{
@class: org.apereo.cas.support.saml.services.SamlRegisteredService
serviceId:
Bartosz,
See, https://apereo.github.io/cas/6.3.x/integration/Attribute-Definitions.html,
for modifying attributes.
Ray
On Fri, 2021-03-19 at 01:47 -0700, Bartosz Nitkiewicz wrote:
Notice: This message was sent from outside the University of Victoria email
system. Please be cautious with links
One more thing. How to change LDAP user name form sAMAccountName to
univ\sAMAccountName. Is it possible?
czwartek, 18 marca 2021 o 14:05:48 UTC+1 Bartosz Nitkiewicz napisał(a):
> Thank You once again.
> As you said, SAML profiles did the trick.It seems to work fine. Now I have
> to pass user
Thank You once again.
As you said, SAML profiles did the trick.It seems to work fine. Now I have
to pass user name from my LDAP to SAML SP. First I need to figure out
proper value for authorization.
Regards
BN
środa, 17 marca 2021 o 19:07:26 UTC+1 richard.frovarp napisał(a):
> The IdP
Thank You once again.
As you said, SAML profiles did the trick.It seems to work fine. Now I have
to pass user name from my LDAP to SAML SP. First I need to find out proper
value for authorization.
Regards
BN
środa, 17 marca 2021 o 19:07:26 UTC+1 richard.frovarp napisał(a):
> The IdP
The IdP automatically generates metadata. And the correct endpoints are
listed on this page, including the metadata endpoint:
https://apereo.github.io/cas/6.3.x/installation/Configuring-SAML2-Authentication.html
Usually with SAML you provide the SP with a copy of your metadata,
ideally loaded
Hi,
Thanks for reply.
What do you mean *your IdP generated metadata*?
I did something like this as they recommended:
https://help.servicedeskplus.com/saml-authentication$configuration
As loginURL I've provided my https://myserver.org/cas/idp, I don't know if
it is correct url?
I'm wondering
Did you provide the app your IdP generated metadata or provide the SP with the
information in a different method? As that's the wrong end point for the SP to
be sending you to:
https://apereo.github.io/cas/6.3.x/installation/Configuring-SAML2-Authentication.html
On Wed, 2021-03-17 at 06:21
Hi,
Another day another CAS problem :)
I'm trying to authenticate servicedeskplus.com application through SAML
protocol.
- I've compiled in cas-server-support-saml-idp in my CAS app.
- Added service registry in CAS-Management app. I used xml file form
servicedesk.
Everything seems
13 matches
Mail list logo