diff --git a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml index 4dcd5486..9ccf1f0f 100644 --- a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml +++ b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-filter.xml @@ -1,10 +1,10 @@ - @@ -21,10 +21,6 @@ - - - - @@ -41,10 +37,13 @@ - - - + + + + + + diff --git a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml old mode 100644 new mode 100755 index de435b56..cf623f26 --- a/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml +++ b/user_saml_shibboleth-php8.0/shibboleth/conf/attribute-resolver.xml @@ -1,12 +1,12 @@ - @@ -141,8 +141,13 @@ - + + + + + + + + + + + cn + + diff --git a/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties b/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties old mode 100644 new mode 100755 index c6d8c2ec..9fd399af --- a/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties +++ b/user_saml_shibboleth-php8.0/shibboleth/conf/ldap.properties @@ -20,7 +20,7 @@ idp.authn.LDAP.trustStore = %{idp.home}/credentials/ldap-s ## Return attributes during authentication ## NOTE: this is not used during attribute resolution; configure that directly in the ## attribute-resolver.xml configuration via a DataConnector's element -idp.authn.LDAP.returnAttributes = cn,businessCategory,mail +idp.authn.LDAP.returnAttributes = cn,mail,quota,groups ## DN resolution properties ## @@ -41,11 +41,13 @@ idp.authn.LDAP.dnFormat = uid=%s,ou=people,dc=idptestbed # LDAP attribute configuration, see attribute-resolver.xml idp.attribute.resolver.LDAP.ldapURL = %{idp.authn.LDAP.ldapURL} idp.attribute.resolver.LDAP.baseDN = %{idp.authn.LDAP.baseDN} +idp.attribute.resolver.LDAP.groupBaseDN = ou=Groups,dc=idptestbed idp.attribute.resolver.LDAP.bindDN = %{idp.authn.LDAP.bindDN} idp.attribute.resolver.LDAP.bindDNCredential = %{idp.authn.LDAP.bindDNCredential} idp.attribute.resolver.LDAP.useStartTLS = %{idp.authn.LDAP.useStartTLS:true} idp.attribute.resolver.LDAP.trustCertificates = %{idp.authn.LDAP.trustCertificates} idp.attribute.resolver.LDAP.searchFilter = (uid=$requestContext.principalName) +idp.attribute.resolver.LDAP.groupFilter = (&(objectclass=groupOfNames)(member=uid=$requestContext.principalName,ou=People,*)) # LDAP pool configuration, used for both authn and DN resolution #idp.pool.LDAP.minSize = 3 @@ -56,4 +58,4 @@ idp.attribute.resolver.LDAP.searchFilter = (uid=$requestContext.principal #idp.pool.LDAP.prunePeriod = 300 #idp.pool.LDAP.idleTime = 600 #idp.pool.LDAP.blockWaitTime = 3000 -#idp.pool.LDAP.failFastInitialize = false \ No newline at end of file +#idp.pool.LDAP.failFastInitialize = false