Hi Darren,
Sorry you're having trouble with this.
You said:
"In AD I have a Vault.authentication.group that acts as the
authentication group into the vault server, and this then has
additional groups added into it, Group.policy.1 and Group.policy.2 for
example."
To me this sounds like you have a group at that DN that you have added
other groups to, but this parameter is not meant to be the DN of a
group itself, but rather the root of a subtree search. The code does
an LDAP search looking for groups rooted at that DN that the user is a
member of (using, currently, memberUid=username, member=userdn, or
uniqueMember=userdn).
I would also suggest checking out the code in
https://github.com/hashicorp/vault/pull/1245 which adds support for
using the memberOf attribute on the user record to find groups in
addition to the subtree search. This is a pretty common thing in AD,
so it may automatically fix your problem without you needing to modify
anything else, and if it does, it'd be a good data point to know.
Best,
Jeff
> --
> This mailing list is governed under the HashiCorp Community Guidelines -
>
https://www.hashicorp.com/community-guidelines.html. Behavior in violation
> of those guidelines may result in your removal from this mailing list.
>
> GitHub Issues:
https://github.com/hashicorp/vault/issues
> IRC: #vault-tool on Freenode
> ---
> You received this message because you are subscribed to the Google Groups
> "Vault" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
vault-tool+...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/vault-tool/2c450e17-993e-4f5e-b818-545b9b799024%40googlegroups.com.
> For more options, visit
https://groups.google.com/d/optout.