• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Issue TOMCAT 7 LDAP INTEGRATION

Hello All

We are trying to integrate Tomcat with LDAP and provide access for a particular group. Below is the configuration we have in server.xml and web.xml

Server.xml

<Realm className="org.apache.catalina.realm.JNDIRealm" debug="99"
connectionURL="ldap://<LDAP SERVER>:389"
alternateURL="ldap://<LDAP SERVER>:389"
connectionName="CN=****,OU=****,OU=****,OU=****,OU=***,DC=***,DC=***"
connectionPassword="******"
referrals="follow"
userBase="DC=****,DC=***"
userSearch="(sAMAccountName={0})"
userSubtree="true"
roleBase="DC=***,DC=***"
roleName="******"
roleSubtree="true"
roleSearch="(member={0})"
groupBase="OU=****,OU=****,OU=****,OU=***,DC=***,DC=***"
groupName="<group name which needs to be intergrated>"
groupSubtree="true"
groupSearch="(uniqueMember={0})"
/>
</Realm>

Web.xml

<security-constraint>
<display-name>ALL USERS</display-name>
<web-resource-collection>
<web-resource-name>ALL USERS</web-resource-name>
<url-pattern>*.jsp</url-pattern>
<url-pattern>*.html</url-pattern>
<url-pattern>*.xml</url-pattern>
<http-method>GET</http-method>
<http-method>POST</http-method>
</web-resource-collection>
<auth-constraint>
<role-name>*</role-name>
</auth-constraint>
</security-constraint>

<login-config>
<auth-method>BASIC</auth-method>
<realm-name>org.apache.catalina.realm.JNDIRealm</realm-name>
</login-config>

<security-role>
<description>Tomcat AD</description>
<role-name>*</role-name>
</security-role>

<welcome-file-list>
<welcome-file>index.html</welcome-file>
<welcome-file>index.htm</welcome-file>
<welcome-file>index.jsp</welcome-file>
</welcome-file-list>

</web-app>


After having this configuration when i try logging URL - https:<servername>:8444 , it asking for username and password. After giving the credentials it's allows till tomcatfront.jsp

When i click on Serverstaus or Manager App or Host manager it's giving me below error


403 Access Denied
You are not authorized to view this page.

If you have already configured the Manager application to allow access and you have used your browsers back button, used a saved book-mark or similar then you may have triggered the cross-site request forgery (CSRF) protection that has been enabled for the HTML interface of the Manager application. You will need to reset this protection by returning to the main Manager page. Once you return to this page, you will be able to continue using the Manager appliction's HTML interface normally. If you continue to see this access denied message, check that you have the necessary permissions to access this application.

If you have not changed any configuration files, please examine the file conf/tomcat-users.xml in your installation. That file must contain the credentials to let you use this webapp.

For example, to add the manager-gui role to a user named tomcat with a password of s3cret, add the following to the config file listed above.

<role rolename="manager-gui"/>
<user username="tomcat" password="s3cret" roles="manager-gui"/>

Note that for Tomcat 7 onwards, the roles required to use the manager application were changed from the single manager role to the following four roles. You will need to assign the role(s) required for the functionality you wish to access.

  • manager-gui - allows access to the HTML GUI and the status pages
  • manager-script - allows access to the text interface and the status pages
  • manager-jmx - allows access to the JMX proxy and the status pages
  • manager-status - allows access to the status pages only
The HTML interface is protected against CSRF but the text and JMX interfaces are not. To maintain the CSRF protection:

  • Users with the manager-gui role should not be granted either the manager-script or manager-jmx roles.
  • If the text or jmx interfaces are accessed through a browser (e.g. for testing since these interfaces are intended for tools not humans) then the browser must be closed afterwards to terminate the session.
For more information - please see the Manager App HOW-TO.



Any help on this is highly appreciated
 
Back
Top