.groupSearchFilter(environment.getProperty("security.providers[" + providerIdx + "].group-search-filter", "(uniqueMember={0})")) .groupRoleAttribute(environment.getProperty("security.providers[" + providerIdx + "].group-role-attribute", "cn")) .rolePrefix("");
@Override public void configure(AuthenticationManagerBuilder auth) throws Exception { auth .ldapAuthentication() .userSearchFilter("(sAMAccountName={0})") .userSearchBase("OU=Mirante User,DC=miranteinfo,DC=com") .rolePrefix("ROLE_") .groupSearchBase("OU=GruposGS,DC=miranteinfo,DC=com") .groupSearchFilter("(member={0})") .userDetailsContextMapper(peticionamentoUserDetailService.orElseThrow(() -> SingularServerException.rethrow( String.format("Bean %s do tipo %s não pode ser nulo. Para utilizar a configuração de segurança %s é preciso declarar um bean do tipo %s identificado pelo nome %s .", SingularUserDetailsService.class.getName(), "SingularUserDetailsService", SingularMiranteADSpringSecurityConfig.class.getName(), SingularUserDetailsService.class.getName(), "SingularUserDetailsService" )) ) ) .contextSource() .managerDn("tomcatLogin") .managerPassword("jnditomcat") .root("DC=miranteinfo,DC=com") .url("ldap://LUA.miranteinfo.com:389/"); }
.ldapAuthentication() .userDetailsContextMapper(new LdapUserDetailsService(ldapAppProperties)) .rolePrefix("") .userDnPatterns(ldapAppProperties.getUserDnPattern()) .groupRoleAttribute(ldapAppProperties.getGroupRoleAttribute())
ldapConfigurer.rolePrefix(rolePrefix);