Hi,
I just started using CAS (v5.0.5), so if this is a silly question, please lead me to the right way.
I created a docker image for openldap (without tls) and add some ldif files for groups and users (some of them are at the end of this post, if it is required *)
I have managed to configure and login from CAS using ldap. After that I also implement a basic SpringBoot application, configure SSL, and also can login from spring-boot application (using spring-security-cas).
The next thing for me to achive is to get user groups from CAS (as far I understood from docs, this could be achievable) and map them to spring-security constructs (within spring-boot application). With some googling, I read some posts (i.e.
JA-SIG CAS with Ldap attributes | BowerStudios.com
) that shows how to code this functionality.
Isn't it possible to get ldap group membership (or other attributes / links) from configuration and provide them to clients by tokens?
If I inferred right, it should be possible ( since it is possible in management server using 'cas.mgmt.authzAttributes[]' keyword to find out the user privileges with conjunction cas.mgmt.adminRoles); and (from https://apereo.github.io/cas/5.1.x/installation/Configuration-Properties.html#ldap-authentication-1 ) there are some attributes in configuration (such as cas.authn.ldap[0].additionalAttributes or cas.authn.ldap[0].credentialCriteria -which I could not find any documentation of what are those-).
Thanks in advance.
*
dn: cn=appadmins,ou=Groups,dc=...
cn: appadmins
objectClass: top
objectClass: posixGroup
gidNumber: 1000
---
dn: cn=appoperators,ou=Groups,dc...
cn: appoperators
objectClass: top
objectClass: posixGroup
gidNumber: 2000
....
dn: cn=appadmin1,ou=Users,dc=....
cn: appadmin1
objectClass: top
objectClass: account
objectClass: posixAccount
objectClass: shadowAccount
cn: appadmin-1
uid: appadmin1
uidNumber: 16005
gidNumber: 1000
homeDirectory: /home/appadmin1
loginShell: /bin/bash
....
dn: cn=operator1,ou=Users,dc....
cn: operator1
objectClass: top
objectClass: account
objectClass: posixAccount
objectClass: shadowAccount
cn: operator1
uid: operator1
uidNumber: 16003
gidNumber: 2000
homeDirectory: /home/operator1
loginShell: /bin/bash
....