Some users need to be able to configure provisioning related settings (attributes), but the Grouper UI doesn't currently make that very user friendly.
This solution will add functionality to the Grouper UI that enables group admins to configure various attribute related to provisioning.
Grouper admins can define Grouper attributes and manage security around those attributes via the standard Grouper mechanisms. Forms-specific
metadata about each attribute is stored in the grouper-ui.properties
file where element type, default values, and list of values can be specified.
This enhancement requires a functioning Grouper UI.
The core code can be compiled by running ./gradlew jar
. The artifact library/jar will be found in ./build/libs/
. This jar needs to be placed in appropriate lib directory. It is TOMCAT_HOME/webapps/grouper/WEB-INF/lib/
. (It is anticipated that this will be applied to a patched app directory.)
src/main/webapp/WEB-INF/grouperUi2/group/
contains a directory structure and two jsp files that need to be placed in the expanded Grouper UI webapp: TOMCAT_HOME/webapps/grouper/WEB-INF/grouperUi2/group/
.
(There is nothing to directly execute.)
The Grouper UI settings are used to control how the attributes are rendered on the Provisioning Target page. In grouper-ui.properties,
property custom.provisioningTargetCandidate.attributeDefName
is set to an attribute name that must be present on a group or its ancestor
folders for the form to be accessible. E.g.,
custom.provisioningTargetCandidate.attributeDefName = etc:attribute:provisioningTargets:provisioningCandidates
Configuration values match up with provisioner names in the new provisioning framework, both to govern which provisioners show up in the form, and how they are presented. For each provisioner, there is a drop-down list with yes/no options. Depending on the submitted value, provisioning will be enabled or removed for that provisioner.
To avoid confusion with the older solution based on attribute-based properties, the property base name starts
with custom.provisioningTarget2.*
.
Property custom.provisioningTarget2.targetNames
is a comma-separated list of provisioners to manage through this UI.
These need to match the actual provisioner names by configId. Each value in this list is a key for properties starting
with custom.provisioningTarget2.targets.{id}.
as defined below.
Properties that can be set in grouper-ui.properties:
Property Name | Default Value | Notes |
---|---|---|
custom.provisioningTarget2.targetNames | None | comma-separated list of provisioners to manage |
custom.provisioningTarget2.targets.{id}.label | "Sync to {configId}" | Optional UI label next to the drop-down list |
custom.provisioningTarget2.targets.{id}.description | Setting this to 'yes' will push this group and its members to {configId}. | Optional help text that appears underneath the drop-down list |
custom.provisioningTarget2.targets.{id}.section | provisioner name | Entries are grouped into categories with a heading, and all entries with the same section will appear together |
An example configuration:
custom.provisioningTarget2.targetNames = invalid-name, LDAPIsMemberOf, AD, googleGroups
# Since there isn't a provisioner with this name, it will log an error to the console, and ignore in the UI
custom.provisioningTarget2.targets.invalid-name.label = Sync to Invalid Provisioner
custom.provisioningTarget2.targets.invalid-name.description = You should not be seeing this
custom.provisioningTarget2.targets.invalid-name.section = LDAP
# Set a friendly name, detailed description, and section for the LDAP provisioner
custom.provisioningTarget2.targets.LDAPIsMemberOf = Sync to LDAP
custom.provisioningTarget2.targets.LDAPIsMemberOf = Setting this to "yes" will push this group and its members to LDAP. Any changes to the local group will continue to be pushed to LDAP. Setting this to "no" will remove the group members. To fully remove the group, delete it from Grouper.
custom.provisioningTarget2.targets.LDAPIsMemberOf = LDAP
# Since there is no label or description, it will set reasonable defaults. Note it will be in the same "LDAP" section as LDAPIsMemberOf
custom.provisioningTarget2.targets.AD.section = LDAP
# Note this is in its own section
custom.provisioningTarget2.targets.googleGroups.label = Sync to Google Groups
custom.provisioningTarget2.targets.googleGroups.description = Setting this to "yes" will push this group and its members to Google Groups. Any changes to the local group will continue to be pushed to Google. Setting this to "no" will remove the group from Google Groups.
custom.provisioningTarget2.targets.googleGroups.section = Google
If the user is not in the wheel group, ADMIN privileges on the group are required to see the form. Also, the user will only
see provisioners when they are in the associated ACL group that authorizes assigning the provisioner to the group
(i.e., the group referred to by grouper-loader property provisioner.{id}.groupAllowedToAssign
).
Form fields are driven by attribute names that exist in subfolders of etc:attribute:provisioningTargets
. These subfolders will be used as
the category names. Any attribute names within the subfolders will become form fields for the corresponding category. The attribute's display
extension will become the field label, and the description will become the help text below the input element.
Form fields will be text fields by default, but can be enhanced with configuration in grouper-ui.properties. The type of form element, default value, and list of select options can be configured.
Reference to [attributeName] in the following text refer to a fully qualified attribute name that has had the colons swapped for hyphens. So
etc:attribute:provisioningTargets:google:googleFavoriteFood
needs to be "encoded" asetc-attribute-provisioningTargets-google-googleFavoriteFood
.
There are four types of elements that the attribute can be rendered as: Yes/No, True/False, user definable dropdown, and the default, a textbox.
This is specified as custom.provisioningTarget.[attributeName].type=<type>
. Possible options include, yesNo
, trueFalse
, and select
. If a
textbox is desired, this property should be commented out, deleted, or left empty.
Property Name | Default Value | Notes |
---|---|---|
custom.provisioningTarget.[attributeName].type | yesNo, trueFalse, select, (empty/non-existent) | The type of the attribute to render as. |
custom.provisioningTarget.[attributeName].default | (n/a) | (optional) The value to set if no value is already set. (see below) |
custom.provisioningTarget.[attributeName].lov | (n/a) | a comma separate list of values |
If it is a select
type, the default value, if defined, needs to be in the lov
list. If the type is yesNo
, then the default value
must be yes
or no
, likewise the default value of a trueFalse
type must be true
or false
, if defined.
# Indicates which attribute must be on a folder/group to allow it have Provisioning Targets assigned to it.
custom.provisioningTargetCandidate.attributeDefName = etc:attribute:provisioningTargets:provisioningCandidates
# A dropdown with no default.
custom.provisioningTarget.etc-attribute-provisioningTargets-google-googleFavoriteFood.lov=pizza,ice cream, chocolate
# A yes/no with a default
custom.provisioningTarget.etc-attribute-provisioningTargets-google-googleSwitchToO365.type=yesNo
custom.provisioningTarget.etc-attribute-provisioningTargets-google-googleSwitchToO365.default=no
# A true/false with a default
custom.provisioningTarget.etc-attribute-provisioningTargets-google-googleIrishGetsTheTitle.type=trueFalse
custom.provisioningTarget.etc-attribute-provisioningTargets-google-googleIrishGetsTheTitle.default=true
# Setting a default of a textbox type
custom.provisioningTarget.etc-attribute-provisioningTargets-ad-adOrgUnit.default=something
Folders or groups must be tagged with an attribute name, specified by the custom.provisioningTargetCandidate.attributeDefName property
.
Subjects that are allowed to create groups under this folder must have "Read Attribute" privs on the folder where the attribute is placed.
The subjects must also have view
privs on the attribute Def
By default, no provisioning targets attributes are available for subjects (group admins) to assign to their groups. Group admins must be given read
and update
(assign)
privs on the Attribute Def of the attribute set(s) that they are allowed to assign.
This project has been supplemented with Docker. Docker's usage allows for quickly deploying the deployed artifact to a consistent, repeatable, local Grouper environment, which facilitates consistent testing.
Docker (or docker-machine/boot2docker for Windows and OS X installations) should be locally installed. If using docker-machine is being used
the proper environment variables must be setup (i.e. those displayed by running boot2docker up
or docker-machine env <vm name>
). docker-machine ip <vm name>
will return the IP of the
Running gradle clean && gradle runContainer
will compile the jar, build on top of the grouper-demo
image (this could take 10-20 minutes
the first time depending upon the network bandwidth available), and start an image. The image can be connected to from a browser by going to the port . docker ps
will display info about the running container. Running
docker exec -it grouper-dev bash
will allow one to connect into the running image.
When testing is complete, exit
to leave the running container. Then run gradle clean
to clean
the environment. Now you are ready to make the necessary code changes and start over again.
The following test work against this container:
Using jsmith (limited user):
- Create a group under Test/Provisioning Enabled Groups. From the group menu, select Provisioning Attributes. The no permissions message displayed.
Using banderson (admin):
- Grant
read
andupdate
privs to thejsmith
user for theetc:attribute:provisioningTargets:google:googleProvisioningTargetDef
attribute definition.
Using jsmith:
- Refresh the page, and the Google attributes should appear.
Using banderson (admin):
- Grant
read
andupdate
privs to thejsmith
user for theetc:attribute:provisioningTargets:ad:adProvisioningTargetDef
attribute definition.
Using jsmith:
- Refresh the page, and the AD attributes should appear as well.
- Set some values and save.
- Go back in an confirm the values saved properly.