User descriptions missing when OpenLDAP used with WebLogic - weblogic12c

I am using a WebLogic 12.2.1.3 server on Linux. I added an OpenLDAP provider in the security realm. Now I see the list of users and group memberships in WebLogic as defined in LDAP and can login with one of those user cn's and password.
So far, so good.
However, in the Users and Groups list, the description column is blank for the LDAP entries. Which attribute should be added to the LDAP object to fill this?

The field is just named "description" for me

Related

LDAP User login succesful without Role membership

My Rundeck detail Rundeck version: 4.10.0
install type: DEB
OS Name/version: Debian 11
DB Type/version: h2
A LDAP user without a Role membership can properly login but can not see any Projects - so far fine.
How can i block such a user to Login at all?
We have one "userBaseDn" Group (userBaseDn="cn=Users,ou=PROD,dc=company,dc=com") in which all users are stored. But of course, only users in following roleBaseDn (roleBaseDn="cn=Rundeck_Admins,cn=Applications,ou=PROD,dc=company,dc=com") Group should have access to Rundeck Web UI.
I expect, only users in Group "Rundeck_Admins" can Login to Rundeck at all
Currently, you can only restrict that using an ACL policy (the user can log in but cannot view/edit/run any project/job, as you say), please take a look at this.
Alternatively, you can create a specific branch in your LDAP server only for Rundeck users.
Currently, means there will be a change on this behavior?
As far a i understand LDAP right, for a specific LADP branch in which a place users, i have to manage users twice. 1st, in user directory and 2nd in the specific Rundeck Group. For me quite unhandy...

JBPM_7.XX: How to change role name "admin" to other name?

Currently, I am integrating JBPM with LDAP with following guide: https://www.youtube.com/watch?v=0UpT92-GIxc.
I have done successfully. But, Our LDAP server already have role "admin" and I cannot add this role to my OU. So, How can i change configuration admin role to other name in jbpm?
Thank all!
In the jbpm.usergroup.callback.properties file, you should configure the "binding" user:
ldap.bind.user=cn\=admin,dc\=jbpm,dc\=org
ldap.bind.pwd=admin
You could try any other one, different than admin.
Notice that if the LDAP server doesn’t allow anonymous binding, then ldap.bind.user and ldap.bind.pwd parameters are mandatory in this file.
In this blog post, you can find a sample for a basic LDAP configuration ("LDAP structure" chapter):
https://blog.kie.org/2021/02/migrating-jbpm-images-secured-by-ldap-to-elytron.html
Take into account to update jboss LdapExtLoginModule with the bindDN and password accordingly.

Mapping LDAP groups to existing keycloak groups

By following the keycloak documentation: https://www.keycloak.org/docs/latest/server_admin/#_ldap_mappers
I created a group mapper like this:
But I don't see an option to give the name keycloak group so that the imported ldap group can be mapped to this group.
Instead , when I "Sync LDAP Groups to Keycloak Groups" , a new group with the name of ldap group is created.
Any idea how to map existing ldap groups to a single keycloak group ?
Default LDAP Provider doesn't provide this option, the only way is custom federation provider. Override this logic in it if you need. ImportSynchronization interface is responsible for it.

How to link / export existing Keycloak user to LDAP

I'm using Keycloak and just setup some OpenLDAP. Importing from LDAP to Keycloak works fine. Even new registrations and updates to users are synced nicely. But I can't find any way to:
a) Export existing Keycloak users to LDAP
b) Linking existing Keycloak users to existing LDAP users
when users already exist in Keycloak, during import I get the following error:
23:56:39,507 WARN
[org.keycloak.storage.ldap.LDAPStorageProviderFactory] (default
task-22) User 'foo' is not updated during sync as he already exists in
Keycloak database but is not linked to federation provider 'ldap'
Any Ideas? Did I missed something obvious?
To send users to LDAP please try to use options "Edit mode: Writable" and "Sync Registrations: ON" on ldap configuration page in Keycloak (User Federation->Ldap).

Artifactory: SAML/ADFS authentication with groups

We are having problems with the authentication via SAML. All users who have an Active Directory user can log into Artifactory - which is not what I want.
I configured Artifactory to use two specific AD groups to allow users in, but we can't seem to get ADFS to filter those same groups
As far as I've understood Artifactory doesn't do anything with SAML authentication besides checking if ADFS says user is allowed or not allowed - is that correct?
Does anyone have experience with that kind of problem or an idea on how to solve this?
We are using Artifactory 5.2.0 at the moment
Never used Artifactory but assuming it's just a SAML SP ...
What is the format of the AD groups? What claim type? You may need a claims rule to transform the attribute to the required format.
ADFS can pass groups as Roles using "Token Groups - Unqualified Names".
Or you can set an access rule in ADFS so that access is denied if the user is not a member of a group.