Uploaded image for project: 'Crowd Data Center'
  1. Crowd Data Center
  2. CWD-1645

Break from 1.6.2: Custom Attributes can no longer be added via SOAP addPrincipal

    • Icon: Bug Bug
    • Resolution: Obsolete
    • Icon: Highest Highest
    • None
    • 2.0
    • SOAP
    • None

      I have a test-suite that created a new user and added a number of custom attributes. This worked fine in Crowd v1.6 but breaks after on Crowd 2.0: the custom attributes are not added to the user. Specifying the well-known attributes such as "sn", "mail", etc works.

            [CWD-1645] Break from 1.6.2: Custom Attributes can no longer be added via SOAP addPrincipal

            Monique Khairuliana (Inactive) made changes -
            Workflow Original: Simplified Crowd Development Workflow v2 - restricted [ 1509343 ] New: JAC Bug Workflow v3 [ 3364516 ]
            Owen made changes -
            Workflow Original: Simplified Crowd Development Workflow v2 [ 1391172 ] New: Simplified Crowd Development Workflow v2 - restricted [ 1509343 ]
            Owen made changes -
            Workflow Original: Crowd Development Workflow v2 [ 273452 ] New: Simplified Crowd Development Workflow v2 [ 1391172 ]
            jawong.adm made changes -
            Workflow Original: JIRA Bug Workflow v2 [ 180521 ] New: Crowd Development Workflow v2 [ 273452 ]
            Justin Koke made changes -
            Resolution New: Obsolete [ 11 ]
            Status Original: Open [ 1 ] New: Closed [ 6 ]

            We will be fixing this issue as part of the linked issue CWD-1672 in 2.0.2.

            Justin Koke added a comment - We will be fixing this issue as part of the linked issue CWD-1672 in 2.0.2.
            Justin Koke made changes -
            Link New: This issue relates to CWD-1672 [ CWD-1672 ]
            kjKJK made changes -
            Link New: This issue is blocked by TST-18717 [ TST-18717 ]
            Michael Ketting made changes -
            Attachment New: Repro.zip [ 33072 ]

            Hi Justin!

            I've attached a repro-project that demonstrates the issues I'm having. It's a console-application that prints various assertions to the console. They should all succeed.

            • I'm using an Internal Directory.
            • I only use the SOAP-API.
            • I don't use LDAP.
            • The "Allow All To Authenticate" flag is set to true for the directory associated with my test application.

            I have two cases (new and existing user) and am also showing the authentication issue I mentioned in the forum (http://forums.atlassian.com/thread.jspa?threadID=36052&tstart=0)

            New User:

            1. I create a new user (including a custom attribute) using the SOAP API (addPrincipal).
            2. I add a second custom attribute (updatePrincipalAttribute).
            3. I get the user (findPrincipalByName).
              -> Only the primary attributes are returned.
              -> In the web-interface I can only see the attribute that was added after the user was created
            4. I use the password specified during creation to attempt a login (authenticatePrincipal).
              -> The login is fails. If I update the password in the web-interface, the login with the new password succeeds.

            Existing User:

            1. I have an existing user (created using Crowd's web-interface).
            2. I update an existing custom attribute (updatePrincipalAttribute).
              -> Only the primary attributes are returned.
              -> In the web-interface I can see that the update on the custom attribute was # I use the password specified in the web-interface to attempt a login (authenticatePrincipal).
              successful.
              -> The login is successful.


            You mentioned

            I know I can add and modify both primary and custom attributes for a user, the only limitation currently is returning custom attributes in our SecurityServer API is currently not available.

            This worked in Crowd 1.6 and is a required feature for the application I'm building. Was this changed in Crowd 2.0?

            Thanks for the quick response,
            Michael

            Michael Ketting added a comment - Hi Justin! I've attached a repro-project that demonstrates the issues I'm having. It's a console-application that prints various assertions to the console. They should all succeed. I'm using an Internal Directory. I only use the SOAP-API. I don't use LDAP. The "Allow All To Authenticate" flag is set to true for the directory associated with my test application. I have two cases (new and existing user) and am also showing the authentication issue I mentioned in the forum ( http://forums.atlassian.com/thread.jspa?threadID=36052&tstart=0 ) New User: I create a new user (including a custom attribute) using the SOAP API (addPrincipal). I add a second custom attribute (updatePrincipalAttribute). I get the user (findPrincipalByName). -> Only the primary attributes are returned. -> In the web-interface I can only see the attribute that was added after the user was created I use the password specified during creation to attempt a login (authenticatePrincipal). -> The login is fails. If I update the password in the web-interface, the login with the new password succeeds. Existing User: I have an existing user (created using Crowd's web-interface). I update an existing custom attribute (updatePrincipalAttribute). -> Only the primary attributes are returned. -> In the web-interface I can see that the update on the custom attribute was # I use the password specified in the web-interface to attempt a login (authenticatePrincipal). successful. -> The login is successful. You mentioned I know I can add and modify both primary and custom attributes for a user, the only limitation currently is returning custom attributes in our SecurityServer API is currently not available. This worked in Crowd 1.6 and is a required feature for the application I'm building. Was this changed in Crowd 2.0? Thanks for the quick response, Michael

              Unassigned Unassigned
              040c2f05355d Michael Ketting
              Affected customers:
              0 This affects my team
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: