You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The default user context mapper for LDAP in ldap-authentication-provider does not give direct access to the CN of the user. Instead we rely on putting the CN into the DN of the user. This makes ACAS difficult to work with on many LDAP setups. This change allows the admin to configure the applicationContext-security.xml file to map users using inetOrgPerson which gives direct access to the CN when the object class of the person is inetOrgPerson.
This fix still relies on parsing the CN to get a first and last name but it avoids having to configure LDAP to put the CN into the DN of the user.
To configure this, the admin would:
Add the inetOrgPersonContextMapper bean into their context security file:
The default user context mapper for LDAP in ldap-authentication-provider does not give direct access to the CN of the user. Instead we rely on putting the CN into the DN of the user. This makes ACAS difficult to work with on many LDAP setups. This change allows the admin to configure the applicationContext-security.xml file to map users using inetOrgPerson which gives direct access to the CN when the object class of the person is inetOrgPerson.
This fix still relies on parsing the CN to get a first and last name but it avoids having to configure LDAP to put the CN into the DN of the user.
To configure this, the admin would:
Add the
inetOrgPersonContextMapper
bean into their context security file:And add the
user-context-mapper-ref
with valueinetOrgPersonContextMapper
to theirldap-authentication-provider
details:The text was updated successfully, but these errors were encountered: