-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support nested groups for LDAP #153
Comments
Hi! |
I would love to see that - or at least there should be the option to use the Extension:(memberOf:1.2.840.113556.1.4.1941:=cn=group,cn=users,DC=x) I tried to set it up but unfortunately it doesn't seem to be used. |
+1 for this |
bump |
bump just encountered the issue, it's blocking us from using Matomo at the moment. |
also bump |
Maybe @AltamashShaikh can help you have visibility on this subject? |
Create a LDAP group "A". Create a LDAP group "B". Set user "X" as member to "A". Set group "A" as member to "B". Note that there could be more levels of nesting than just 2 groups. |
We're considering implementing this. I have a Q: from a LDAP perspective, should Nested Groups always be resolved? (or are there cases you'd want to disable that and then we also need a setting for this - but ideally we don't need a new setting) |
I could not think of any reason why one would not want to. |
The rationale for making recursion optional is for cases of large/poorly structured directories where it could cause slow-downs. (Not a case I've ever faced personally). |
No option needed @AltamashShaikh we can implement the nested resolution logic to all 👍 |
Are you guys sure, you want to implement the recursion yourself? This can get VERY bad and slow on big forests. Normally the "1.2.840.113556.1.4.1941" search options is there for exactly this. Here is a simple User-Lookup which we use in sonarqube for example:
As you can see there's a placeholder for finding the user. The trick here is not to get the users of the group and than match the user but instead offload the check for a given user directly to ldap / AD |
@pfeigl The LDAP_MATCHING_RULE_IN_CHAIN is great but I'm not sure it can currently be used with how LoginLdap is configured. Have you tested this with LoginLdap? Often enabling recursion is behind a configuration flag. |
Having it togglable might be the right way. Btw I finally managed to get it working with the current state of the implementation. The trick was not to use Than just put the correct group in the group field and you should be good to go. With this combination, the search query is actually setup correctly internally. |
@pfeigl with the above setting, nested groups are working perfectly for you? |
Yes, it worked just as expected (We are only doing login integration, no mass sync. This would probably not work this way) |
@pfeigl Tested and if @Mndarin @lgromb Does setting LDAP memberOf Field as |
The plugin should resolve nested groups.
The text was updated successfully, but these errors were encountered: