- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for LdapUser (0.25 sec)
-
src/main/java/org/codelibs/fess/ldap/LdapUser.java
import org.codelibs.fess.mylasta.direction.FessConfig; import org.codelibs.fess.util.ComponentUtil; import org.dbflute.optional.OptionalThing; /** * An LDAP user. */ public class LdapUser implements FessUser { private static final long serialVersionUID = 1L; /** The environment for LDAP connection. */ protected Hashtable<String, String> env; /** The name of the user. */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 4.1K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/ldap/LdapUserTest.java
assertEquals("anotheruser", user2.getName()); // Test with empty name LdapUser user3 = new LdapUser(testEnv, ""); assertEquals("", user3.getName()); // Test with null name LdapUser user4 = new LdapUser(testEnv, null); assertNull(user4.getName()); } public void test_getEnvironment() {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Tue Aug 19 14:09:36 UTC 2025 - 16.6K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/ldap/LdapManager.java
* @return a new LdapUser instance */ protected LdapUser createLdapUser(final String username, final Hashtable<String, String> env) { return new LdapUser(env, username); } /** * Retrieves roles for the specified LDAP user based on the provided filters. * * @param ldapUser the LDAP user to retrieve roles for
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 82K bytes - Viewed (0) -
cmd/user-provider-utils.go
if !credentials.IsServiceAccount() && !credentials.IsTemp() { return madmin.BuiltinProvider // regular users are always internal } claims := credentials.Claims if _, ok := claims[ldapUser]; ok { return madmin.LDAPProvider // ldap users } if _, ok := claims[subClaim]; ok { providerPrefix, _, found := strings.Cut(credentials.ParentUser, getKeySeparator()) if found {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
cmd/ftp-server-driver.go
expiryDur, err := globalIAMSys.LDAPConfig.GetExpiryDuration("") if err != nil { return nil, err } claims := make(map[string]any) claims[expClaim] = UTCNow().Add(expiryDur).Unix() claims[ldapUser] = lookupResult.NormDN claims[ldapActualUser] = lookupResult.ActualDN claims[ldapUserN] = ctx.Sess.LoginUser() // Add LDAP attributes that were looked up into the claims.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 14.3K bytes - Viewed (0) -
cmd/sts-handlers.go
// JWT claim keys expClaim = "exp" subClaim = "sub" audClaim = "aud" issClaim = "iss" // JWT claim to check the parent user parentClaim = "parent" // LDAP claim keys ldapUser = "ldapUser" // this is a key name for a normalized DN value ldapActualUser = "ldapActualUser" // this is a key name for the actual DN value ldapUserN = "ldapUsername" // this is a key name for the short/login username
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/sftp-server.go
} expiryDur, err := globalIAMSys.LDAPConfig.GetExpiryDuration("") if err != nil { return nil, err } claims[expClaim] = UTCNow().Add(expiryDur).Unix() claims[ldapUserN] = user claims[ldapUser] = lookupResult.NormDN cred, err := auth.GetNewCredentialsWithMetadata(claims, globalActiveCred.SecretKey) if err != nil { return nil, err }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 16.5K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
} } writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) return } targetUser = lookupResult.NormDN opts.claims[ldapUser] = targetUser // DN opts.claims[ldapActualUser] = lookupResult.ActualDN // Check if this user or their groups have a policy applied. ldapPolicies, err := globalIAMSys.PolicyDBGet(targetUser, targetGroups...)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
cmd/site-replication.go
} // Extract the username and lookup DN and groups in LDAP. ldapUser, isLDAPSTS := claims.Lookup(ldapUserN) if isLDAPSTS { // Need to lookup the groups from LDAP. _, ldapGroups, err := globalIAMSys.LDAPConfig.LookupUserDN(ldapUser) if err != nil { return fmt.Errorf("unable to query LDAP server for %s: %w", ldapUser, err) } cred.Groups = ldapGroups }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 184.7K bytes - Viewed (0) -
cmd/admin-handlers-users.go
if err != nil { writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) return } targetUser = lookupResult.NormDN opts.claims[ldapUser] = targetUser // username DN opts.claims[ldapActualUser] = lookupResult.ActualDN // Add LDAP attributes that were looked up into the claims. for attribKey, attribValue := range lookupResult.Attributes {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0)