Make strict AD group names optional
This commit is contained in:
@@ -51,7 +51,7 @@ namespace C4IT_IAM_SET
|
||||
public ICollection<string> ownerUserSids;
|
||||
public ICollection<string> readerUserSids;
|
||||
public ICollection<string> writerUserSids;
|
||||
public bool allowExistingGroupWildcardMatch;
|
||||
public bool forceStrictAdGroupNames;
|
||||
|
||||
public int ReadACLPermission = 0x200A9;
|
||||
public int WriteACLPermission = 0x301BF;
|
||||
@@ -145,7 +145,7 @@ namespace C4IT_IAM_SET
|
||||
newSecurityGroups.username = username;
|
||||
newSecurityGroups.domainName = domainName;
|
||||
newSecurityGroups.password = password;
|
||||
newSecurityGroups.AllowExistingGroupWildcardMatch = allowExistingGroupWildcardMatch;
|
||||
newSecurityGroups.ForceStrictAdGroupNames = forceStrictAdGroupNames;
|
||||
try
|
||||
{
|
||||
// ImpersonationHelper.Impersonate(domainName, username, new NetworkCredential("", password).Password, delegate
|
||||
@@ -277,7 +277,7 @@ namespace C4IT_IAM_SET
|
||||
username = username,
|
||||
domainName = domainName,
|
||||
password = password,
|
||||
AllowExistingGroupWildcardMatch = allowExistingGroupWildcardMatch
|
||||
ForceStrictAdGroupNames = forceStrictAdGroupNames
|
||||
};
|
||||
}
|
||||
|
||||
@@ -913,10 +913,10 @@ namespace C4IT_IAM_SET
|
||||
users = null;
|
||||
|
||||
newSecurityGroups.EnsureADGroup(groupOUPath, newSecurityGroups.IAM_SecurityGroups[i], users);
|
||||
if (newSecurityGroups.IAM_SecurityGroups[i].ReusedExistingEntry)
|
||||
resultToken.reusedGroups.Add(newSecurityGroups.IAM_SecurityGroups[i].Name);
|
||||
else
|
||||
if (newSecurityGroups.IAM_SecurityGroups[i].CreatedNewEntry)
|
||||
resultToken.createdGroups.Add(newSecurityGroups.IAM_SecurityGroups[i].Name);
|
||||
else
|
||||
resultToken.reusedGroups.Add(newSecurityGroups.IAM_SecurityGroups[i].Name);
|
||||
}
|
||||
}
|
||||
catch (Exception E)
|
||||
|
||||
Reference in New Issue
Block a user