-
-
Notifications
You must be signed in to change notification settings - Fork 891
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Search full LDAP directory" doesn't actually work #11548
Comments
I'm having the same issue here. I only just today set up the LDAP application, outpost, provider, flows, etc. so I don't know if it was working previously. If I use the akadmin account I can search for users and see all of them. Using the service account I created it can only find itself and the groups it's a member of. I have tried giving it superuser permission, all LDAP permissions, and all permissions to users the user search still only returns the bind user. I'm also using 2024.8.3, deployed using the helm template. |
Same issue here. Using the "Search full LDAP directory" permission to the bind user makes the query only return the bind user itself. Running 2024.8.3 with docker-compose |
@DrMax1 @shawnbonifas @Banh-Canh are you assigning the search full LDAP directory to the service user within a single provider or globally? Also try restarting the LDAP outpost after the permissions are assigned, this might be a caching part (it shouldn't but just to rule it out) |
@BeryJu I am assigning the permission to the service user globally: I restarted the LDAP outpost and also set the provider to direct binding and querying to avoid caching issues. I also tried downgrading to Version 2024.8.2 but the issue persists. |
We confirm this bug: lost a lot of hours debugging today: the problem is with In https://version-2024-8.goauthentik.io/docs/providers/ldap/ I read
So, we are stuck |
These are the relative commits #10639 Updated: |
Do you mean creating a role, assigning the "Search full LDAP directory" permission to said role, assigning this role to a group and then adding the relevant service users? I tried it and it doesn't work either unfortunately. I think there must be an issue with the the permission in the authorization code. |
I've figured out how to allow a user, in the context of this issue, to "Search full LDAP directory" without the need to make it a superuser (so without make it member of So you need to have this which can be accomplish by Application/Provider/Ldap Permissions TAB, then Assign new User this way we have: Et voilà |
so I guess this issue can be easily solved just with few words in documentation |
This actullay solved the problem! Thanks for tinkering around and finding the solution! :) Would you mind starting a PR to add this to the documentation so it can help future users? |
When you added the permission, did you need to restart the outpost container ? Because on my instance it was the only way that the permissions would be applied. |
Describe the bug
"Search full LDAP directory" doesn't actually work.
To Reproduce
Steps to reproduce the behavior:
Add "Search full LDAP directory" permission to a freshly created user/serviceaccount. Then run the query:
It only returns the binduser.
If I ran the same command after I gave superuser permission to the bind user, it just work and i get the whole directory of users.
Expected behavior
I should get the whole directory of user with this permission without superuser rights.
Version and Deployment (please complete the following information):
The text was updated successfully, but these errors were encountered: