diff --git a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml
index 4dcd5486..9ccf1f0f 100644
--- a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml
+++ b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml
@@ -1,10 +1,10 @@
-
@@ -21,10 +21,6 @@
-
-
-
-
@@ -41,10 +37,13 @@
-
-
-
+
+
+
+
+
+
diff --git a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml
old mode 100644
new mode 100755
index de435b56..cf623f26
--- a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml
+++ b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml
@@ -1,12 +1,12 @@
-
@@ -141,8 +141,13 @@
-
+
+
+
+
+
+
+
+
+
+
+ cn
+
+
diff --git a/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties b/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties
old mode 100644
new mode 100755
index c6d8c2ec..9fd399af
--- a/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties
+++ b/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties
@@ -20,7 +20,7 @@ idp.authn.LDAP.trustStore = %{idp.home}/credentials/ldap-s
## Return attributes during authentication
## NOTE: this is not used during attribute resolution; configure that directly in the
## attribute-resolver.xml configuration via a DataConnector's element
-idp.authn.LDAP.returnAttributes = cn,businessCategory,mail
+idp.authn.LDAP.returnAttributes = cn,mail,quota,groups
## DN resolution properties ##
@@ -41,11 +41,13 @@ idp.authn.LDAP.dnFormat = uid=%s,ou=people,dc=idptestbed
# LDAP attribute configuration, see attribute-resolver.xml
idp.attribute.resolver.LDAP.ldapURL = %{idp.authn.LDAP.ldapURL}
idp.attribute.resolver.LDAP.baseDN = %{idp.authn.LDAP.baseDN}
+idp.attribute.resolver.LDAP.groupBaseDN = ou=Groups,dc=idptestbed
idp.attribute.resolver.LDAP.bindDN = %{idp.authn.LDAP.bindDN}
idp.attribute.resolver.LDAP.bindDNCredential = %{idp.authn.LDAP.bindDNCredential}
idp.attribute.resolver.LDAP.useStartTLS = %{idp.authn.LDAP.useStartTLS:true}
idp.attribute.resolver.LDAP.trustCertificates = %{idp.authn.LDAP.trustCertificates}
idp.attribute.resolver.LDAP.searchFilter = (uid=$requestContext.principalName)
+idp.attribute.resolver.LDAP.groupFilter = (&(objectclass=groupOfNames)(member=uid=$requestContext.principalName,ou=People,*))
# LDAP pool configuration, used for both authn and DN resolution
#idp.pool.LDAP.minSize = 3
@@ -56,4 +58,4 @@ idp.attribute.resolver.LDAP.searchFilter = (uid=$requestContext.principal
#idp.pool.LDAP.prunePeriod = 300
#idp.pool.LDAP.idleTime = 600
#idp.pool.LDAP.blockWaitTime = 3000
-#idp.pool.LDAP.failFastInitialize = false
\ No newline at end of file
+#idp.pool.LDAP.failFastInitialize = false