diff --git a/daikoku/app/controllers/LoginController.scala b/daikoku/app/controllers/LoginController.scala index cd704e1be..36b5038e0 100644 --- a/daikoku/app/controllers/LoginController.scala +++ b/daikoku/app/controllers/LoginController.scala @@ -245,11 +245,9 @@ class LoginController(DaikokuAction: DaikokuAction, )(ctx.request) ) case AuthProvider.LDAP => - AuditTrailEvent( - s"unauthenticated user with $username has tried to login [LDAP provider]") + AuditTrailEvent(s"unauthenticated user with $username has tried to login [LDAP provider]") .logUnauthenticatedUserEvent(ctx.tenant) - val ldapConfig = - LdapConfig.fromJsons(ctx.tenant.authProviderSettings) + val ldapConfig = LdapConfig.fromJsons(ctx.tenant.authProviderSettings) LdapSupport.bindUser(username, password, diff --git a/daikoku/app/login/ldap.scala b/daikoku/app/login/ldap.scala index ba9fa682b..aae50f60d 100644 --- a/daikoku/app/login/ldap.scala +++ b/daikoku/app/login/ldap.scala @@ -391,11 +391,12 @@ object LdapSupport { val userId = UserId(BSONObjectID.generate().stringify) val team = getPersonalTeam(tenant.id, name, userId) val user = getUser(userId, - tenant.id, - name, - email, - ldapConfig.pictureField, - attrs) + tenant.id, + name, + email, + ldapConfig.pictureField, + attrs, + isDaikokuAdmin = false) for { _ <- _env.dataStore.teamRepo .forTenant(tenant.id)