Active directory integration and grant access base on AD group membership

Luc Paulin paulinster at gmail.com
Wed Feb 15 18:35:51 CET 2017


Thank you, that work .. Thanx!

I'll definately look at upgrading to v3. I did notice that my version was
so old. I just took the one our the centos6's repo .


  -Luc


--
                         !!!!!
                       ( o o )
 --------------oOO----(_)----OOo--------------
   Luc Paulin
   email: paulinster(at)gmail.com
   Skype: paulinster


2017-02-15 12:21 GMT-05:00 Alan DeKok <aland at deployingradius.com>:

> On Feb 15, 2017, at 12:15 PM, Luc Paulin <paulinster at gmail.com> wrote:
> >
> > Ok thanx for your reply .. I think that I now start to better understand
> > how the this work..  So policies need/can be written within the auth so
> we
> > can reject request base on the person's group membership and huntgroup ..
> >
> > So base on this I made this simple switch case that I added to the
> > authorize section after the ldap module
>
>   OK.
>
> > However when I test I dont seem to be getting the expecting result.
> >
> > ++[pap] = noop
>
>   You're running version 2.  Ugh.  Why not upgrade to a version of the
> server which was released in the last 5 years?
>
> > Look like the Ldap-Group did found that the user is member of the
> > devopsuser group, which is correct, however, when I do the negative
> compare
> > (!=) it also return true.  I have also tried with "=="  got the exact
> same
> > result,
>
>   In v2, you have to do:
>
>         if (!(LDAP-Group == "foo")) {
>
>   This is fixed in v3.  There are a LOT of good reasons for upgrading to
> v3.
>
>   Alan DeKok.
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/
> list/users.html
>


More information about the Freeradius-Users mailing list