SAML Authentication using LDAP groups

Bellina, Brendan bbellina at ucla.edu
Tue Dec 1 17:14:40 EST 2015


Glad you were able to get the behavior you wanted, but I¹m left a bit
confused. This is checking against the user¹s display name attribute
value, not the display name of a group the user is in, right?  I thought
you were trying to determine what groups the user was in.

Regards,

Brendan Bellina
Identity Mgmt. Architect, IT Services, UCLA



On 12/1/15, 1:29 PM, "users on behalf of Cahill, Charles (GE Appliances)"
<users-bounces at shibboleth.net on behalf of Charles.Cahill at ge.com> wrote:

>Thank you all for your input on this.  I was able to solve the problem by
>using configurations
>on the Apache side SP.
>
>Made the below changes in the shib.conf
>Require shib-attr displayname ${DISPLAYNAME}  did the trick.  Now, only
>users with a specific LDAP
>Displayname can access my application.  I am feeding in the
>APPLICATION_ENDPOINT,
>PROTECTEDAPPROOT AND DISPLAYNAME as variables in docker that are fed into
>the Apache SP code
>I have in github to create an Apache instance with the Shibboleth Service
>Provider installed.
>
><VirtualHost *:80>
>  
>        ProxyPass /Shibboleth.sso !
>	ProxyPass / ${APPLICATION_ENDPOINT}
>        ProxyPassReverse /Shibboleth.sso !
>	ProxyPassReverse / ${APPLICATION_ENDPOINT}
>	RequestHeader set cn "%{cn}e"
>	RequestHeader set firstname "%{firstname}e"
>	RequestHeader set lastname "%{lastname}e"
>	RequestHeader set email "%{email}e"
>	RequestHeader set uid "%{uid}e"
>	RequestHeader set displayname "%{displayname}e"
>
>	<Location /Shibboleth.sso>
>	  Satisfy Any
>	  Allow from all
>	</Location>
>
>    	<Location /${PROTECTEDAPPROOT}>
>    		AuthType shibboleth
>    		ShibRequestSetting requireSession 1
>    		Require shib-attr displayname ${DISPLAYNAME}
>	</Location>
></VirtualHost>
>
>-----Original Message-----
>From: users [mailto:users-bounces at shibboleth.net] On Behalf Of Curry,
>Warren
>Sent: Tuesday, December 01, 2015 2:44 PM
>To: Shib Users
>Subject: RE: SAML Authentication using LDAP groups
>
>It would seem that you want to do authorization against groups. Not
>authentication with groups.
>
>Why not make the  LDAp groups an load an Attribute in you saml2 doc?
>Tthis can then be used to determine authorization..
>
>Perhaps I am missing something ...
>
>whc
>
>-----Original Message-----
>From: users [mailto:users-bounces at shibboleth.net] On Behalf Of Cahill,
>Charles (GE Appliances)
>Sent: Tuesday, December 01, 2015 10:59 AM
>To: Shib Users <users at shibboleth.net>
>Subject: RE: SAML Authentication using LDAP groups
>
>I am also wondering, could this be handled on the Apache SP side in the
>conf file handling Location information?
>
>-----Original Message-----
>From: Cahill, Charles (GE Appliances)
>Sent: Tuesday, December 01, 2015 10:24 AM
>To: Shib Users
>Subject: SAML Authentication using LDAP groups
>
>Hey All:
>
>	I am looking to do something I believe is unique here with Shibboleth
>and need some help to
>	Understand if it is possible.
>
>	I need Shibboleth to do Authentication against LDAP groups.  The
>challenge is that LDAP groups
>	contain DN's, not UID information, so the UID must first be gathered and
>the DN pulled out.	
>	The groups branch must then be searched with that DN to see what groups
>the user is a member of.
>	The authentication would then need to be done against that information.
>We are doing something
>	Similar with authorization and the code is below.  My question is, can
>scripts be used in the login.config
>	to do something along these lines or are scripts not able to be used
>there.  I would think I need to use
>	requisite and required login modules to make this work as well maybe
>with some variables.
>
>	Here is our authorization methodology for returning the displayname of a
>group as a header.  I need
>	Not to return this header in some instances but to be able to do full
>authentication based on group 	membership.
>
>		<!--ODSEE LDAP Groups Connector Configs-->
>	<resolver:DataConnector id="slapd-xxxx-user-groups"
>xsi:type="dc:LDAPDirectory"
>		ldapURL="ldaps://xxxxx  ldaps://xxxxx"
>		principalCredential="xxxxx"
>		principal="xxxxx"
>		connectionStrategy="ACTIVE_PASSIVE"
>		maxResultSize="50"
>		mergeResults="true"
>		baseDN="ou=xxxxxgroups,ou=groups,o=xx.com">
>		<resolver:Dependency ref="slapd-xxx.xxx.xx.com" />
>		<resolver:Dependency ref="gexxxuid" />
>		<dc:FilterTemplate>
>			<![CDATA[
>			(&(gexxxxxunit=Appliances)(uniquemember=gexxxuid=$gexxxuid.get(0),ou=ge
>xxx,o=xx.com))
>			]]>
>		</dc:FilterTemplate>
>		<dc:ReturnAttributes>displayname</dc:ReturnAttributes>
>		<dc:LDAPProperty name="java.naming.ldap.factory.socket"
>value="javax.net.ssl.SSLSocketFactory"/>
>		<dc:ConnectionPool
>			minPoolSize="1"
>			maxPoolSize="8"
>			blockWhenEmpty="true"
>			blockWaitTime="PT5S"
>			expirationTime="PT10M"/>
>	</resolver:DataConnector>
>--
>To unsubscribe from this list send an email to
>users-unsubscribe at shibboleth.net
>-- 
>To unsubscribe from this list send an email to
>users-unsubscribe at shibboleth.net
>-- 
>To unsubscribe from this list send an email to
>users-unsubscribe at shibboleth.net



More information about the users mailing list