Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 11 for LdapUser (0.25 sec)

  1. src/main/java/org/codelibs/fess/ldap/LdapUser.java

    import org.codelibs.fess.mylasta.direction.FessConfig;
    import org.codelibs.fess.util.ComponentUtil;
    import org.dbflute.optional.OptionalThing;
    
    /**
     * An LDAP user.
     */
    public class LdapUser implements FessUser {
    
        private static final long serialVersionUID = 1L;
    
        /** The environment for LDAP connection. */
        protected Hashtable<String, String> env;
    
        /** The name of the user. */
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  2. src/test/java/org/codelibs/fess/ldap/LdapUserTest.java

            assertEquals("anotheruser", user2.getName());
    
            // Test with empty name
            LdapUser user3 = new LdapUser(testEnv, "");
            assertEquals("", user3.getName());
    
            // Test with null name
            LdapUser user4 = new LdapUser(testEnv, null);
            assertNull(user4.getName());
        }
    
        public void test_getEnvironment() {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Tue Aug 19 14:09:36 UTC 2025
    - 16.6K bytes
    - Viewed (0)
  3. src/main/java/org/codelibs/fess/ldap/LdapManager.java

         * @return a new LdapUser instance
         */
        protected LdapUser createLdapUser(final String username, final Hashtable<String, String> env) {
            return new LdapUser(env, username);
        }
    
        /**
         * Retrieves roles for the specified LDAP user based on the provided filters.
         *
         * @param ldapUser the LDAP user to retrieve roles for
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 82K bytes
    - Viewed (0)
  4. cmd/user-provider-utils.go

    	if !credentials.IsServiceAccount() && !credentials.IsTemp() {
    		return madmin.BuiltinProvider // regular users are always internal
    	}
    
    	claims := credentials.Claims
    	if _, ok := claims[ldapUser]; ok {
    		return madmin.LDAPProvider // ldap users
    	}
    
    	if _, ok := claims[subClaim]; ok {
    		providerPrefix, _, found := strings.Cut(credentials.ParentUser, getKeySeparator())
    		if found {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  5. cmd/ftp-server-driver.go

    			expiryDur, err := globalIAMSys.LDAPConfig.GetExpiryDuration("")
    			if err != nil {
    				return nil, err
    			}
    			claims := make(map[string]any)
    			claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    
    			claims[ldapUser] = lookupResult.NormDN
    			claims[ldapActualUser] = lookupResult.ActualDN
    			claims[ldapUserN] = ctx.Sess.LoginUser()
    
    			// Add LDAP attributes that were looked up into the claims.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  6. cmd/sts-handlers.go

    	// JWT claim keys
    	expClaim = "exp"
    	subClaim = "sub"
    	audClaim = "aud"
    	issClaim = "iss"
    
    	// JWT claim to check the parent user
    	parentClaim = "parent"
    
    	// LDAP claim keys
    	ldapUser       = "ldapUser"       // this is a key name for a normalized DN value
    	ldapActualUser = "ldapActualUser" // this is a key name for the actual DN value
    	ldapUserN      = "ldapUsername"   // this is a key name for the short/login username
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  7. cmd/sftp-server.go

    	}
    
    	expiryDur, err := globalIAMSys.LDAPConfig.GetExpiryDuration("")
    	if err != nil {
    		return nil, err
    	}
    
    	claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    	claims[ldapUserN] = user
    	claims[ldapUser] = lookupResult.NormDN
    
    	cred, err := auth.GetNewCredentialsWithMetadata(claims, globalActiveCred.SecretKey)
    	if err != nil {
    		return nil, err
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  8. cmd/admin-handlers-idp-ldap.go

    				}
    			}
    			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
    			return
    		}
    		targetUser = lookupResult.NormDN
    		opts.claims[ldapUser] = targetUser // DN
    		opts.claims[ldapActualUser] = lookupResult.ActualDN
    
    		// Check if this user or their groups have a policy applied.
    		ldapPolicies, err := globalIAMSys.PolicyDBGet(targetUser, targetGroups...)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 08 02:46:04 UTC 2025
    - 19.2K bytes
    - Viewed (0)
  9. cmd/site-replication.go

    	}
    
    	// Extract the username and lookup DN and groups in LDAP.
    	ldapUser, isLDAPSTS := claims.Lookup(ldapUserN)
    	if isLDAPSTS {
    		// Need to lookup the groups from LDAP.
    		_, ldapGroups, err := globalIAMSys.LDAPConfig.LookupUserDN(ldapUser)
    		if err != nil {
    			return fmt.Errorf("unable to query LDAP server for %s: %w", ldapUser, err)
    		}
    
    		cred.Groups = ldapGroups
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 184.7K bytes
    - Viewed (0)
  10. cmd/admin-handlers-users.go

    		if err != nil {
    			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
    			return
    		}
    		targetUser = lookupResult.NormDN
    		opts.claims[ldapUser] = targetUser // username DN
    		opts.claims[ldapActualUser] = lookupResult.ActualDN
    
    		// Add LDAP attributes that were looked up into the claims.
    		for attribKey, attribValue := range lookupResult.Attributes {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 90.6K bytes
    - Viewed (0)
Back to top