Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


  • contextFactory defines a factory for accessing a source of users data. Here we are using the instance from Isis framework - It allows defining a way how to connect to LDAP and authorize users.
    • contextFactory.url defines an address of used LDAP server as URL(RFC 2255). An LDAP URL is defined by the following grammar:
      scheme "://" [host [ ":" port ]] ["/"  [dn ["?" [attributes] ["?" [scope]  ["?" [filter] ["?" extensions]]]]]]
      scheme: Indicates the URL scheme. This class library supports either the traditional "ldap" for normal LDAP connections or "ldaps" for SSL connections (see SSL Support section).
      • host: Name of the LDAP server.
      • port: The LDAP server's port number.
      • dn: Identifies the base object for the operation.
      • attributes: Comma separated list of attributes to be returned. If not specified then the default is to return all attributes.
      • scope: The scope of a search, one of "base", "sub" or "one", representing base object, subtree or one level, respectively. If not specified then the default is "base".
      • filter: The search filter. If not specified then the default is "(objectclass=*)".
      • extension: This provides the LDAP URL with an extensibility mechanism, allowing the capabilities of the URL to be extended in the future. The only extension supported by this toolkit is "bindname".
    • contextFactory.systemAuthenticationMechanism. Authentication mechanism for service user. Service user is used for connecting to LDAP server and accessing the rest of data. To authenticate such a system user LDAP server could use such the mechanisms:
      • Anonymous (property value “none”) — no security information is provided.
      • Simple (property value “simple”) — the client provides a clear text name and password.
      • Simple Authentication and Security Layer (SASL) (property value depends of the underlying mechanism. For example, “CRAM-MD5” or “GSSAPI”) — the client and server negotiate an authentication system based on a challenge and response protocol that conforms to RFC2222.
        More information about authentication mechanism you can find here:
    • contextFactory.systemUsername. Distinguished Name of service user.
    • contextFactory.systemPassword. Password for service user.
    • contextFactory.authenticationMechanism. Authentication mechanism for users. See description for contextFactory.systemAuthenticationMechanism property.
  • ldapRealm defines a realm for LDAP data.
    A Realm is a component that can access application-specific security data such as users, roles, and permissions. The Realm translates this application-specific data into a format that Shiro understands so Shiro can in turn provide a single easy-to-understand Subject programming API no matter how many data sources exist or how application-specific your data might be.
    Here we are using instance of from Isis framework. In addition to standard LDAP Shiro realm it also allows to map assigning permissions for authenticated users.
    • ldapRealm.contextFactory. Link real context factory with defined above instance.
      In general, it’s possible also to define basic LDAP connection parameters directly for realm.  But in this case we can lost some advantages of additional attributes.
    • ldapRealm.userDnTemplate. This property allows specifying the LDAP server's User DN format.
      During an authentication attempt, if the submitted principal is a simple username, but the LDAP directory expects a complete User Distinguished Name (User DN) to establish a connection, the userDnTemplate property must be configured. If not configured, the property will pass the simple username directly as the User DN, which is often incorrect in most LDAP environments (maybe Microsoft ActiveDirectory being the exception).
      User DN formats are unique to the LDAP directory's schema, and each environment differs - you will need to specify the format corresponding to your directory. You do this by specifying the full User DN as normal, but you use a {0} placeholder token in the string representing the location where the user's submitted principal (usually a username or uid) will be substituted at runtime.
      For example, if your directory uses an LDAP uid attribute to represent usernames, the User DN for the jsmith user may look like this:
      in which case you would set this property with the following template value:
      uid= uid={0},ou=users,o=fixicc
    • ldapRealm.searchBase. Search base for user groups.
    • ldapRealm.groupObjectClass. Group object class.
    • ldapRealm.uniqueMemberAttribute. Attribute name in group for mapping user with this group.
    • ldapRealm.uniqueMemberAttributeValueTemplate. value template for mapping user with group.
    • ldapRealm.rolesByGroup. Property for mapping LDAP groups with roles. If no group-to-role mapping is provided, then the group names are used as role names with no translation.
    • ldapRealm.permissionsByRole. Property for mapping permissions for roles.
  • securityManager.realms. Directly link our realm to security manager. It’s possible to define few realms and link them to security manager.