-
Bug
-
Resolution: Done
-
Major
-
7.12.0.GA
-
None
-
False
-
False
-
Documentation (Ref Guide, User Guide, etc.), Release Notes
-
-
-
-
-
-
CR1
-
+
-
-
-
2022 Week 05-07 (from Jan 31)
When roleMapper is set like the following
auth: ... roleMapper: from: kind: ConfigMap name: ldap-role-mapping rolesKeepMapped: false rolesKeepNonMapped: false rolesProperties: /etc/ldap-role-mappings.properties
mapped-role-mapper "kie-custom-role-mapper" is set like the following.
<!-- ##KIE_AUTH_LDAP_DEFAULT_ROLE## --> <simple-role-decoder name="from-roles-attribute" attribute="Roles"/> <!-- ##KIE_ROLE_DECODER## --> <simple-role-decoder name="groups-to-roles" attribute="groups"/> <mapped-role-mapper name="kie-custom-role-mapper" keep-mapped="false" keep-non-mapped="false"> <role-mapping from="rhpam_admin" to="admin"/> <role-mapping from="rhpam_kieserver" to="kie-server"/> <role-mapping from="rhpam_restall" to="rest-all"/> <role-mapping from="rhpam_administrators" to="Administrators"/> <role-mapping from="rhpam_all" to="admin kie-server rest-all Administrators"/> </mapped-role-mapper>
But this role-mapper is not specified in the security-domain "KIELdapSecurityDomain".
<security-domain name="KIELdapSecurityDomain" default-realm="KIELdapRealm" permission-mapper="default-permission-mapper"> <realm name="KIELdapRealm" role-decoder="from-roles-attribute"/> </security-domain>
Note: make sure that the defaultRole still wroking with the mapping roles configuration