<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: How to configure groups and roles mapping using ldapRealm in Shiro config for Zeppelin ? in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-groups-and-roles-mapping-using-ldapRealm-in/m-p/226491#M188351</link>
    <description>&lt;P&gt;@farhanekarim The feature was added in zeppelin 0.7.0, so you should be able to get it working.  There's some &lt;A href="https://zeppelin.apache.org/docs/0.7.2/security/shiroauthentication.html#ldap"&gt;documentation&lt;/A&gt; on using LdapRealm, but there aren't many examples floating about, best to look at the conf example in the &lt;A href="https://github.com/apache/zeppelin/blob/v0.7.2/zeppelin-server/src/main/java/org/apache/zeppelin/realm/LdapRealm.java"&gt;code&lt;/A&gt;.  Basically you want something like:&lt;/P&gt;&lt;PRE&gt;ldapRealm = org.apache.zeppelin.realm.LdapRealm
ldapRealm.contextFactory.url = ldap://localhost:33389
ldapRealm.contextFactory.authenticationMechanism = simple
ldapRealm.contextFactory.systemUsername = uid=guest,ou=people,dc=hadoop,dc=apache,dc=org
ldapRealm.contextFactory.systemPassword = S{ALIAS=ldcSystemPassword}
ldapRealm.authorizationEnabled = true
ldapRealm.userSearchBase = dc=hadoop,dc=apache,dc=org
ldapRealm.groupSearchBase = ou=groups,dc=hadoop,dc=apache,dc=org
ldapRealm.userObjectClass = person
ldapRealm.groupObjectClass = groupofnames
ldapRealm.userSearchAttributeName = sAMAccountName
ldapRealm.memberAttribute = member
ldapRealm.rolesByGroup = LDN_USERS: user_role, NYK_USERS: user_role, GLOBAL_ADMIN: admin_role
&lt;/PRE&gt;&lt;PRE&gt;[roles]
user_role = *
admin_role= *&lt;/PRE&gt;&lt;P&gt;The code for Zeppelin is similar to the Apache Knox codebase, so if you get stuck have a look for Knox LDAP configuration (e.g. &lt;A href="https://developer.ibm.com/hadoop/2016/08/03/ldap-integration-with-apache-knox/"&gt;here&lt;/A&gt;).&lt;/P&gt;</description>
    <pubDate>Fri, 03 Nov 2017 19:56:09 GMT</pubDate>
    <dc:creator>s_fischaber</dc:creator>
    <dc:date>2017-11-03T19:56:09Z</dc:date>
  </channel>
</rss>

