-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Check Permission via AD group - LDAPCP #32
Comments
Hi @Albino1006 |
Hello @Yvand We have enabled the augmentation option and selected the claim type from dropdown. But still it doesn't show that the user has XYZ permission via that AD group on checknow in SharePoint permission page. Is there anything else that can be checked? Awaiting your reply. Thanks. |
Hello @Yvand We have enabled the augmentation option and selected the claim type from dropdown. But still it doesn't show that the user has XYZ permission via that AD group on checknow in SharePoint permission page. Is there anything else that can be checked? Awaiting your reply. Thanks. |
Basically, when you enable augmentation, LDAPCP will generate claims to provide the group membership of trusted users to SharePoint. |
Hello Yvan,
We have encounter an issue in our SharePoint environment using LDAPCP.
Consider a scenario where a user is granted XYZ permission via AD group in SharePoint (and not explicitly using his ID). Now when we do check permission with that user ID, it should show that this user has XYZ permission via that AD group, but it doesn't (it only shows the permission assigned to it via his ID).
This behavior is seen only on sites with custom Identity provider using LDAPCP and not on sites with AD NTLM.
Are we missing something? Awaiting your reply. Thanks.
The text was updated successfully, but these errors were encountered: