Loosening the parseForeignSecurityPrincipal regex

to allow more "valid" well-known SIDs through.
diff --git a/src/com/google/enterprise/adaptor/ad/AdEntity.java b/src/com/google/enterprise/adaptor/ad/AdEntity.java
index f1e60c2..a1062c9 100644
--- a/src/com/google/enterprise/adaptor/ad/AdEntity.java
+++ b/src/com/google/enterprise/adaptor/ad/AdEntity.java
@@ -308,7 +308,7 @@
     int end = dn.indexOf(',');
     String sid = dn.substring(start + 1, end);
     // check for mangled or malformed security principal format
-    if (!sid.matches("^S-1-5-21(-[0-9]+)+$")) {
+    if (!sid.matches("^S-1-[15](-[0-9]+)+$")) {
       log.fine("invalid foreign security principal [" + dn + "].");
       return null;
     }