<sec:ldap-server id="ldapServer" url="${ldap.url}"
manager-dn="${ldap.authn.managerDN}"
manager-password="${ldap.authn.managerPassword}" />
<sec:ldap-user-service id="userDetailsService" server-ref="ldapServer"
group-search-base="${ldap.authn.group.baseDn}" group-role-attribute="${ldap.authn.group.roleAttr}"
group-search-filter="${ldap.authn.group.searchFilter}"
user-search-base="${ldap.authn.user.baseDn}"
user-search-filter="${ldap.authn.user.searchFilter}"/>
# LDAP Server
ldap.url=<omitted>
# LDAP connection timeout in millisecondsldap.connectTimeout=3000
# Whether to use StartTLS (probably needed if not SSL connection)ldap.useStartTLS=false
# Base DN of users to be authenticated
ldap.authn.user.baseDn=cn=users,cn=accounts,dc=epc-instore,dc=com
# Manager DN for authenticated searches
ldap.authn.managerDN=uid=<omitted>,cn=users,cn=accounts,dc=epc-instore,dc=com
# Manager password for authenticated searches
ldap.authn.managerPassword=<omitted>
# Search filter used for configurations that require searching for DNs
#ldap.authn.searchFilter=(&(uid={user})(accountState=active))
ldap.authn.user.searchFilter=(uid={0})
ldap.authn.group.searchFilter=gidNumber=1886200029
ldap.authn.group.baseDn=cn=groups,cn=accounts,dc=epc-instore,dc=com
ldap.authn.group.roleAttr=cn
# Search filter used for configurations that require searching for DNs
#ldap.authn.format=uid=%s,ou=Users,dc=example,dc=org
ldap.authn.format=uid=%s,cn=users,cn=accounts,dc=epc-instore,dc=com
# A path to trusted X.509 certificate for StartTLS
ldap.trustedCert=/path/to/cert.cer
This basically should allow you configure access roles into the app. You get the roles for the user, and you decide which of those roles is a match so access can be granted. Is that what you are trying to do?
If you search the archives, you will come across http://comments.gmane.org/gmane.comp.java.jasig.cas.user/24806 which might help.
--
You received this message because you are subscribed to the Google Groups "CAS Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cas-user+u...@apereo.org.
Visit this group at https://groups.google.com/a/apereo.org/group/cas-user/.
403 usually means you’re denied access to the app. Possibly because of a role mismatch L
You might get more mileage out of the integration if you discussed the change with Spring Security folks, and what you might have to do to extend it. It takes a while to decipher, and in recent versions of the platform, Spring Sec is removed in favor of something that is easier understood and augmented. Perhaps the changes could be backported.