You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@shiro.apache.org by "opticyclic (JIRA)" <ji...@apache.org> on 2016/09/19 00:53:20 UTC

[jira] [Created] (SHIRO-587) Can't Access Groups If userPrincipalName Doesn't Exist

opticyclic created SHIRO-587:
--------------------------------

             Summary: Can't Access Groups If userPrincipalName Doesn't Exist
                 Key: SHIRO-587
                 URL: https://issues.apache.org/jira/browse/SHIRO-587
             Project: Shiro
          Issue Type: Bug
            Reporter: opticyclic
            Priority: Blocker


Sometimes you need to use sAMAccountName instead of userPrincipalName in your search.
However, this is hard-coded in a private method
https://github.com/apache/shiro/blob/master/core/src/main/java/org/apache/shiro/realm/activedirectory/ActiveDirectoryRealm.java#L171

See here for a similar question on stackoverflow
http://stackoverflow.com/questions/24062383/shiro-ldap-authorization-config/34896329#34896329

There is a similar bug in Spring Security
https://github.com/spring-projects/spring-security/issues/2448

Making the search query was configurable in the shiro.ini would be useful.

Making the getRoleNamesForUser protected instead of private would make sub-classing easier.
Or keep the method private but make a protected method that returns Object[] searchArguments.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)