Unfortunately, none of these tickets seems to offer a solution.
This post is pretty much related, and  Predrag Minovic stated a solution
but we could not get it working, yet.
https://community.hortonworks.com/questions/109655/how-to-configure-groups-and-roles-mapping-using-ld.html


On Mon, 9 Jul 2018 at 17:42, Ruslan Dautkhanov <dautkha...@gmail.com> wrote:

> These two committed fixes aren't in 0.8.0
> https://github.com/apache/zeppelin/pull/3045
> https://github.com/apache/zeppelin/pull/3037
> S
> ​ee if one of them is relevant to your issue.
>
> ​
>
> --
> Ruslan Dautkhanov
>
>
> On Mon, Jul 9, 2018 at 9:24 AM András Kolbert <kolbertand...@gmail.com>
> wrote:
>
>> The latest, 0.8
>>
>> On Mon, 9 Jul 2018, 17:21 Ruslan Dautkhanov, <dautkha...@gmail.com>
>> wrote:
>>
>>> Which version of Zeppelin you're using?
>>> If it's 0.7, try 0.8 I remember seeing some issues were fixed in 0.8 and
>>> in master regarding this AD/LDAP groups...
>>>
>>> --
>>> Ruslan Dautkhanov
>>>
>>>
>>> On Mon, Jul 9, 2018 at 3:23 AM kolbertand...@gmail.com <
>>> kolbertand...@gmail.com> wrote:
>>>
>>>> Hi,
>>>>
>>>> We've been trying to add the right shiro configuration to ensure that a
>>>> specific AD group can only log in, and also differentiate roles. We got two
>>>> working solutions, but the first let's in everyone within the active
>>>> directory (but the roles work fine), the second does not let in everyone
>>>> but the roles do not work.
>>>>
>>>> 1)
>>>> This version works for the adding roles to the specific CNs but allows
>>>> everyone to login.
>>>>
>>>> activeDirectoryRealm =
>>>> org.apache.zeppelin.realm.ActiveDirectoryGroupRealm
>>>> activeDirectoryRealm.systemUsername = aduser
>>>> activeDirectoryRealm.hadoopSecurityCredentialPath =
>>>> jceks://file/user/zeppelin/conf/zeppelin.jceks
>>>> activeDirectoryRealm.searchBase = OU=User Accounts,DC=domain,DC=local
>>>> activeDirectoryRealm.url = ldap://AD.domain.local:389
>>>> activeDirectoryRealm.groupRolesMap = "CN=admins,OU=User
>>>> Accounts,DC=domain,DC=local":"admin"
>>>> activeDirectoryRealm.authorizationCachingEnabled = false
>>>> activeDirectoryRealm.principalSuffix = @domain.local
>>>> securityManager.realms = $activeDirectoryRealm
>>>>
>>>> 2)
>>>> This version limits down the login to the specified AD group, but does
>>>> not associates roles with the group.
>>>> ldapADGCRealm = org.apache.zeppelin.realm.LdapRealm
>>>> ldapADGCRealm.contextFactory.systemUsername = aduser@domain.local
>>>> ldapADGCRealm.hadoopSecurityCredentialPath =
>>>> jceks://file/user/zeppelin/conf/zeppelinldap.jceks
>>>> ldapADGCRealm.searchBase = "OU=User Accounts,DC=domain,DC=local"
>>>> ldapADGCRealm.userSearchBase = "OU=User Accounts,DC=domain,DC=local"
>>>> ldapADGCRealm.groupSearchBase = "OU=User Accounts,DC=domain,DC=local"
>>>> ldapADGCRealm.groupObjectClass = group
>>>> ldapADGCRealm.memberAttribute = memberUid
>>>> ldapADGCRealm.groupIdAttribute = cn
>>>> ldapADGCRealm.groupSearchEnableMatchingRuleInChain = true
>>>> ldapADGCRealm.rolesByGroup = users: admin
>>>> ldapADGCRealm.userSearchFilter =
>>>> (&(objectclass=user)(sAMAccountName={0})(memberOf=CN=users,OU=User
>>>> Accounts,DC=domain,DC=local))
>>>> ldapADGCRealm.contextFactory.url = ldap://AD.domain.local:389 (edited)
>>>>
>>>>
>>>>
>>>> Related posts:
>>>>
>>>> https://community.hortonworks.com/questions/54896/zeppelin-ad-users-not-binded-to-groups.html
>>>>
>>>> https://community.hortonworks.com/questions/82135/how-to-limit-access-to-zeppelin-webui-based-for-sp.html
>>>>
>>>> Any ideas where we go wrong?
>>>>
>>>> Thanks,
>>>> Andras
>>>>
>>>

Reply via email to