-
Notifications
You must be signed in to change notification settings - Fork 222
The Variables in "RestrictedADGroups" and "AllowedADGroups" in appsettings.json aren't being honored. #333
Comments
Your settings look fine. Let me take a look in the code. |
I thank you very much
|
Are you running the Windows provider or LDAP (Linux) Provider? |
Windows 2008r2
On Wed, Sep 18, 2019 at 5:29 PM +0200, "Geovanni Perez" <notifications@github.com> wrote:
Are you running the Windows provider or LDAP (Linux) Provider?
|
Good day Señior Perez, any updates on this issue? I would greatly appreciate an update. |
Hi, we did some testing on our end, buy @Serk352 was not able to reproduce. I'm going to give a try again by myself. |
Quick question, can you post the log file? Sometimes the AD is not returning properly the user's groups and this might bypass the groups check. |
Which log do you need and where may I locate it? |
You may need to activate, check step 9 https://github.com/unosquare/passcore#installation-on-iis |
Did you get the logs? |
HI sorry for the delay: here is the relevant part of the log
is there a setting to route the POST-Request over HTTPS? |
I did some changes to the group validation check. Can you check the latest version, please? |
Status? |
Sorry, I unfortunately had more pressing issues to attend to. I'll look into updating this by Friday and will report my findings when I do. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
PassCore Server
appsettings.json.txt
Describe the bug
The Variables in RestrictedADGroups and AllowedADGroups in
[IIS_ROOT]\PassCore\appsettings.json
aren't being honored. I can, without failure, change any domain-admin passwords I like (given I know the origianal PW of course), even though only the members of the AD-Group "ExternalUsers" should be allowed to update their passwords. Please analyse my settings an tell me if I missed something.
To Reproduce
Steps to reproduce the behavior:
normal use
Expected behavior
only allow users that are members of the AD-Group "ExternalUsers"
Screenshots
NOT APPLICABLE
Desktop (please complete the following information):
Additional context
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered: