I would like to configure SSO in Apache incl. group-based authentication. It means that users, who are a member of a particular group, should be able to log in to the website without entering the login data. Users, who aren't a member of the group, should be denied from logging in to the website.
Kerberos and LDAP are working fine on the webserver. I have already checked it with kinit, klist and ldapsearch. The Apache's site configuration for Kerberos/LDAP is as follows:
AuthType Kerberos
AuthName "Active Directory"
KrbMethodNegotiate On
KrbMethodK5Passwd On
KrbServiceName HTTP
KrbAuthRealms domain.com
KrbLocalUserMapping On
Krb5Keytab /etc/apache2/kerb.keytab
Require valid-user
AuthLDAPBindAuthoritative On
AuthLDAPURL "ldaps://dc.domain.com/DC=domain,DC=com?sAMAccountName?sub?"
AuthLDAPRemoteUserAttribute "sAMAccountName"
AuthLDAPBindDN "CN=ldapuser,OU=servicegroups,DC=domain,DC=com"
AuthLDAPBindPassword "<password>"
require ldap-filter memberOf:1.2.840.113556.1.4.1941:=CN=ldapgroup,OU=groups,DC=domain,DC=com
Problem: Users are able to log in without entering the login data by using SSO. But it's not only the case for authenticated users, but also for unauthenticated users. It seems that LDAP does not check at all whether the user is a member of the group "ldapgroup" or not.
Is the LDAP filter still correct, or what did I wrong here?