Authenticated memberof group

Daniel McDonald daniel.mcdonald at umb.edu
Wed May 3 16:30:39 EDT 2017


In a normal situation yes we'd like to tell the users why its failing, 
in this particular project though, a failed login with no explanation is 
fine.

I was trying to do something like both you and Scott mentioned, changing 
the LDAP search filter to only allow access if they're in a certain 
group. This is shibboleth idp 3.3.1 BTW.

Right now I have this as my CDATA section within my DataConnector which 
successfully matches on the mail attribute. The CDATA values are 
actually a variable %{idp.attribute.resolver.LDAP.searchFilter} in 
attribute-resolver.xml but these are the values it should be reading 
when it runs.

This is successfully authenticating:

  <FilterTemplate>
             <![CDATA[
                 (mail=$requestContext.principalName)
             ]]>
  </FilterTemplate>

I tried this next line but it didnt seem to work, users not in the group 
are able to login:

  <FilterTemplate>
             <![CDATA[
(&(mail=$requestContext.principalName)(memberOf=CN=MyGroup,CN=Users,DC=school,DC=net))
             ]]>
  </FilterTemplate>

Should that work?

Thanks
Dan


On 05/02/2017 07:21 PM, IAM David Bantz wrote:
> Shibb developers have built in enormous flexibility into the IdP so 
> you no doubt implement such a restriction in the IdP, the simplest way 
> I thought of is Scott's, including the membership in the LDAP search 
> during the initial authentication (if using jaas.config, 
> userFilter="(&(sAMAccountName={user})(memberOf=CN=MyGroup,CN=Users,DC=umass,DC=net)". 
>
>
> One issue is that that tactic in itself will result in failed 
> authentication if the user isn't in the group, without indication to 
> user of why or what to do about it.
>
> Wouldn't it be preferable to have the IdP release an appropriate set 
> of memberOf values to the SP, and let the SP do authorization and 
> respond appropriately to the user: "You authenticated, but you do not 
> have access to this service; here's why or what you do about that..."?
>
> David Bantz
> UA OIT IAM
>
> On Tue, May 2, 2017 at 3:10 PM, Cantor, Scott <cantor.2 at osu.edu 
> <mailto:cantor.2 at osu.edu>> wrote:
>
>     On 5/2/17, 6:36 PM, "users on behalf of Daniel McDonald"
>     <users-bounces at shibboleth.net
>     <mailto:users-bounces at shibboleth.net> on behalf of
>     daniel.mcdonald at umb.edu <mailto:daniel.mcdonald at umb.edu>> wrote:
>
>     > We'd like to limit who's logging into shibboleth based on not
>     only their
>     > password, but if they're in a group as well.
>
>     Then why don't you change your LDAP filter in the authentication
>     check to exclude entries that aren't in the group?
>
>     > I can return the "memberOf" attribute with a list of the users
>     groups. I
>     > hoped that putting this in the ldap search filter would work but
>     it didnt:
>
>     That looks like it's from the attribute resolver. How would that
>     impact authentication?
>
>     -- Scott
>
>
>     --
>     To unsubscribe from this list send an email to
>     users-unsubscribe at shibboleth.net
>     <mailto:users-unsubscribe at shibboleth.net>
>
>
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://shibboleth.net/pipermail/users/attachments/20170503/5da3121b/attachment.html>


More information about the users mailing list