Hi all,

As some AD forbid search operation with anonymous binding, 
org.apache.shiro.realm.activedirectory.ActiveDirectoryRealm will fail to get 
authorization info without a manager account. But, since user has logged in 
before, which means user has bound successfully and able to do search over 
LDAP, I'd prefer using user’s account to search for it’s LDAP attributes, and I 
think the manager account is totally unnecessary.

There is at least two ways to achieve this, but both has blocked after read the 
source code:

1) search LDAP attributes right after binding:
    Problem is no straight way to put roles to authorization cache, related 
methods are mostly private
2) bind again while get authorization info:
    Problem is at this step the only information of authentication is 
principals, no credentials

I hope Shiro dev team deal with this, or let me know if there is better 
solution.

Thank you all.

Reply via email to