Le 2011-11-05 06:13, Marvin Addison a écrit :
I guess what I was really looking for is a way of making sure the handlers
get run again.
I can say from experience that you can do just about anything you can
imagine with Spring Webflow. We don't have any documentation on the
makeup of the CAS lo
The username is unique, the uid isn't unique (I have the same uid for my
staff account as my student account). We must (*mandated*) return the uid
as the principal...
but without having the original login username, how can we match that to
the correct user in LDAP to get the correct attributes?
Sorry I didn't get back earlier. My filter was messed up, and all the
cas-user list stuff got dumped in my unfiltered box that I usually just
go and skim, and mark it read.
Why use eclipse? lol I've gone through the pain of attempting to switch
back to eclipse MANY times, and it's just a ver
Hi,
We are setting up a cas 3.4.10 war overlayed version, and We just changed
the ticket registry from default to JPATicketRegistry following the
instructions in :
https://wiki.jasig.org/display/CASUM/JpaTicketRegistry
We are using oracle, when we try the new setup in the development
environme
Hi Faisal,
You never mentioned what platform your API is for... I was only presenting an
option in case that platform was a database API, or if their API made use of
stored procedures for validating authentication...
In any event, you'll most likely want to write a handler that inherits from
o
Trying to get CAS to authenticate against AD over LDAP, getting this error:
http://pastebin.com/JFCuRBBb
Don't really understand what it is saying or why it is blank.
Here is my deployerConfig:
http://pastebin.com/ZZCnZE4P
Here's the part of the log before, it gets up to the point of generating
Can't you just map the value from the attributes? You don't need the one
they actually typed in?
On Thu, Nov 17, 2011 at 11:16 AM, David Hicks wrote:
> We're getting the attributes back now, but I'm trying to get the username
> that was used during login to come back with the attributes. When
Hope I'm not off base here, but I think adding a line like
Would do it. Just change SAMAccountname to whatever the username field is
called in your LDAP.
Kim
~=|=~
Kim Cary
Chief Information Security Officer
Pepperdine University
On Thu, Nov 17, 2011 at 8
We're getting the attributes back now, but I'm trying to get the username
that was used during login to come back with the attributes. When a user
successfully logs in, the resolver sets the principalAttributeName as their
"uid" (a number); not their username (cn/name/samAccountName). Is there a
wa