Principal Resolution
Note that in most if not all cases, CAS authentication is able to retrieve and resolve attributes from the authentication source, which would eliminate the need for configuring a separate resolver specially if both the authentication and the attribute source are the same. Using separate resolvers should only be required when sources are different, or when there is a need to tackle more advanced attribute resolution use cases such as cascading, merging, etc. See this guide for more info.
cas.authn.ldap[0].principalAttributeList=memberOf, samaccountname, displayName, mailcas.authn.ldap[0].type=AUTHENTICATEDcas.authn.ldap[0].ldapUrl=ldaps://dc.domain.comcas.authn.ldap[0].useSsl=truecas.authn.ldap[0].baseDn=cn=users,dc=domain,dc=comcas.authn.ldap[0].bindDn=cn=admin,ou=admin,dc=domain,dc=comcas.authn.ldap[0].bindCredential=**************cas.authn.ldap[0].searchFilter=(|(sAMAccountName={user})(mail={user}))cas.authn.ldap[0].principalAttributeId=samaccountnamecas.authn.ldap[0].validator.baseDn=cn=users,dc=domain,dc=comPersonDirectoryPrincipalResolver(attributeRepository=org.apereo.services.persondir.support.CachingPersonAttributeDaoImpl@41e5bc47, principalFactory=org.apereo.cas.authentication.principal.DefaultPrincipalFactory@1, returnNullIfNoAttributes=false, principalNameTransformer=org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver$$Lambda$167/1993482928@71e35b54, principalAttributeNames=null, useCurrentPrincipalId=false)