Granny's Programming Pearls
"inside of every large program is a small program struggling to get out"
JavaRanch.com/granny.jsp
Win a copy of Android Programming: The Big Nerd Ranch Guide this week in the Android forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic

Tomcat LDAP configuration  RSS feed

 
Frank Stani
Greenhorn
Posts: 1
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hello All

We are trying to integrate Tomcat 7 with LDAP and provide access for a particular group.  Below is the configuration we have in server.xml and web.xml

Server.xml

<Realm className="org.apache.catalina.realm.JNDIRealm" debug="99"
        connectionURL="ldap://<LDAP SERVER>:389"
        alternateURL="ldap://<LDAP SERVER>:389"
        connectionName="CN=****,OU=****,OU=****,OU=****,OU=***,DC=***,DC=***"
        connectionPassword="******"
        referrals="follow"
        userBase="DC=****,DC=***"
        userSearch="(sAMAccountName={0})"
        userSubtree="true"
        roleBase="DC=***,DC=***"
        roleName="******"
        roleSubtree="true"
        roleSearch="(member={0})"
        groupBase="OU=****,OU=****,OU=****,OU=***,DC=***,DC=***"
                   groupName="<group name which needs to be intergrated>"
                   groupSubtree="true"
                   groupSearch="(uniqueMember={0})"
  />
                    </Realm>

Web.xml

<security-constraint>
   <display-name>ALL USERS</display-name>
   <web-resource-collection>
     <web-resource-name>ALL USERS</web-resource-name>
     <url-pattern>*.jsp</url-pattern>
     <url-pattern>*.html</url-pattern>
     <url-pattern>*.xml</url-pattern>
     <http-method>GET</http-method>
     <http-method>POST</http-method>
   </web-resource-collection>
   <auth-constraint>
     <role-name>*</role-name>
   </auth-constraint>
</security-constraint>

<login-config>
      <auth-method>BASIC</auth-method>
      <realm-name>org.apache.catalina.realm.JNDIRealm</realm-name>
   </login-config>

<security-role>
   <description>Tomcat AD</description>
   <role-name>*</role-name>
</security-role>

<welcome-file-list>
        <welcome-file>index.html</welcome-file>
        <welcome-file>index.htm</welcome-file>
        <welcome-file>index.jsp</welcome-file>
    </welcome-file-list>

</web-app>


After having this configuration,  when i try logging URL - https:<servername>:8444 , it asking for username and password. After giving the credentials it's allows till tomcatfront.jsp

When i click on Serverstaus or Manager App or Host manager it's giving me below error


403 Access Denied
You are not authorized to view this page.

If you have already configured the Manager application to allow access and you have used your browsers back button, used a saved book-mark or similar then you may have triggered the cross-site request forgery (CSRF) protection that has been enabled for the HTML interface of the Manager application. You will need to reset this protection by returning to the main Manager page. Once you return to this page, you will be able to continue using the Manager appliction's HTML interface normally. If you continue to see this access denied message, check that you have the necessary permissions to access this application.   

If you have not changed any configuration files, please examine the file conf/tomcat-users.xml in your installation. That file must contain the credentials to let you use this webapp.

For example, to add the manager-gui role to a user named tomcat with a password of s3cret, add the following to the config file listed above.

<role rolename="manager-gui"/>
<user username="tomcat" password="s3cret" roles="manager-gui"/>

Note that for Tomcat 7 onwards, the roles required to use the manager application were changed from the single manager role to the following four roles. You will need to assign the role(s) required for the functionality you wish to access.

• manager-gui - allows access to the HTML GUI and the status pages
• manager-script - allows access to the text interface and the status pages
• manager-jmx - allows access to the JMX proxy and the status pages
• manager-status - allows access to the status pages only
The HTML interface is protected against CSRF but the text and JMX interfaces are not. To maintain the CSRF protection:

• Users with the manager-gui role should not be granted either the manager-script or manager-jmx roles.
• If the text or jmx interfaces are accessed through a browser (e.g. for testing since these interfaces are intended for tools not humans) then the browser must be closed afterwards to terminate the session.
For more information - please see the Manager App HOW-TO.   



Any help on this is highly appreciated

 
With a little knowledge, a cast iron skillet is non-stick and lasts a lifetime.
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
Boost this thread!