Hi John,
I'm using 'user' in the web.xml file, but I am also using 'supplementalRoles="user"' in my login configuration, so all users will be given 'user'.
web.xml:
<security-role>
<role-name>user</role-name>
</security-role>
root@uniquehostname:/etc/rundeck# cat jaas-multiauth.conf
multiauth {
com.dtolabs.rundeck.jetty.jaas.JettyCachingLdapLoginModule sufficient
debug="true"
contextFactory="com.sun.jndi.ldap.LdapCtxFactory"
providerUrl="ldap://
ldap.example.com:3268"
bindDn="CN=Rundeck Auth,OU=Users,DC=example,DC=com"
bindPassword="PASSWORD"
authenticationMethod="simple"
forceBindingLogin="true"
userBaseDn="DC=example,DC=com"
userRdnAttribute="sAMAccountName"
userIdAttribute="sAMAccountName"
userPasswordAttribute="userPassword"
userObjectClass="user"
roleBaseDn="OU=Groups,DC=example,DC=com"
roleNameAttribute="sAMAccountName"
roleMemberAttribute="member"
roleObjectClass="group"
cacheDurationMillis="3000"
supplementalRoles="user" reportStatistics="true"
nestedGroups="true";
org.eclipse.jetty.plus.jaas.spi.PropertyFileLoginModule required
debug="true"
file="/etc/rundeck/realm.properties";
};
realm.properties:
admin:XXXXXX,user,admin,architect,deploy,build
I've got three different groups that will be logging in - Admins, Developers, and Users, which permissions will be handled via ACLs, so I have an admin.aclpolicy, dev.aclpolicy, and user.aclpolicy that handle permissions. Adding additional groups will be as simple as creating a new policy and granting the AD groups permissions.
James