Sorry much *appreciated*.
However, I have not been able to login as a customer yet.
I used you kindly provided config, and really the only parts I changed
are those which pertain to my setup.
ldaphost,ldapuser,ldapuserpw, basedn, agent group dn, and user group dn.
I can login as an Agent, but not as a customer.
Here's the log output....
I login...
Kernel::System::Auth::LDAP::Auth] User: mjoyce (CN=Matt
Joyce,OU=IT,OU=Operations,OU
=xxxx,DC=xxxx,DC=xxxx) authentication ok (REMOTE_ADDR: xxx.xxx.xxx.xxx).
I logout....
[Notice][Kernel::System::AuthSession::DB::RemoveSessionID] Removed
SessionID 10ac457be93b8d79
1d1529f8552d0b0c13.
I try as customer...
[Notice][Kernel::System::Auth::LDAP::Auth] User: mjoyce.test
authentication failed, no LDAP group entry foundGroup
DN='cn=OTRS-Agents,ou=Groups,dc=xxxx,dc=xxxx',
Filter='(member=CN=mjoyce.test,OU=IT,OU=Operations,OU=xxxx,DC=xxx
,DC=xxxx)'! (REMOTE_ADDR: xxx.xxx.xxx.xxx).
To me this seem right my customer account mjoyce.test is not a member
of the agent group.
But why doesn't it test (and report in the log file) against the customer group.
Have I completely misunderstood something, customers are able to login
to login via the web right ?
thanks
On 6/12/07, Matthew Joyce <[EMAIL PROTECTED]> wrote:
> Much unappreciated Greg, I'm going to work through this today.
> I have the Agent group working, but not the customer group.
>
> With your setup, are Agents in both groups?
>
> Thanks
>
>
> On 6/8/07, Greg Horne <[EMAIL PROTECTED]> wrote:
> >
> >
> > Sorry to hear its going slow. Had fun also with getting it to work using
> > AD. You did not include all of your config for LDAP, so I'll just cover a
> > few general things.
> >
> > Setup a user account that can browse AD's LDAP. (username - OTRS_Account
> > password - whatever) you may want to make it never expire.
> >
> > Setup two groups, one for Customers and one for Agents.
> >
> > Make AD users members of the Customers group.
> >
> > Add AD users to the Agents group that you want to use the system as an
> > agent.
> >
> > Create a user in OTRS and add to the admin group using the same username
> > that you intend to login to AD with.
> >
> > Modify your Config.pm file adding the following to allow agents and
> > customers/users to login using LDAP. Modify for your structure. Taken from
> > my setup, add and modify as needed. Just an example:
> > ############## Start of Config.pm ################
> > <snip>
> >
> > #we want to use LDAP for Auth
> > $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
> > $Self->{'AuthModule::LDAP::Host'} = 'ldap.domain.com';
> > $Self->{'AuthModule::LDAP::BaseDN'} =
> > 'dc=domainname,dc=win,dc=domain,dc=com';
> > $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
> > #The username and password of the user you setup to access LDAP
> > information in AD
> > $Self->{'AuthModule::LDAP::SearchUserDN'} =
> > 'CN=otrs_helpdesk,OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com';
> > $Self->{'AuthModule::LDAP::SearchUserPw'} = 'whateverYourPasswordIs';
> >
> > #We want our Customer/users to Auth using LDAP
> > $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
> >
> > $Self->{'Customer::AuthModule::LDAP::Host'} = 'ldap.domain.com';
> > $Self->{'Customer::AuthModule::LDAP::BaseDN'} =
> > 'OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com';
> > $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
> > $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} =
> > 'CN=otrs_helpdesk,OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com';
> > $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} =
> > 'whateverYourPasswordIs';
> >
> > $Self->{CustomerUser} = {
> > Module => 'Kernel::System::CustomerUser::LDAP',
> > Params => {
> > Host => 'ldap.domain.com',
> > BaseDN => 'OU=Users,OU=OldTown,DC=domain,DC=win,DC=domain,DC=com',
> > SSCOPE => 'sub',
> > UserDN =>
> > 'CN=otrs_helpdesk,OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com',
> > UserPw => 'whateverYourPasswordIs',
> > },
> > CustomerKey => 'sAMAccountName',
> > CustomerID => 'userPrincipalName',
> > CustomerUserListFields => ['displayName', 'userPrincipalName'],
> > CustomerUserSearchFields => ['displayName', 'userPrincipalName'],
> > CustomerUserPostMasterSearchFields => userPrincipalName,
> > CustomerUserNameFields => ['givenName', 'sn'],
> > #the following must map to valid fields in your AD
> > (givenname,sn,sAMAccountName,...)
> > Map => [
> > [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
> > [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
> > [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
> > [ 'UserEmail', 'Email', 'userPrincipalName', 1, 1, 'var' ],
> > [ 'UserCustomerID', 'CustomerID', 'userPrincipalName', 0, 1, 'var' ],
> > ],
> > };
> >
> >
> > #OK now lets have our agents use LDAP
> > $Self->{'AuthModule::LDAP::GroupDN'} =
> > 'CN=helpdesk_agents,OU=Groups,OU=OldTown,DC=domain,DC=win,DC=domain,DC=com';
> > $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
> > $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
> >
> >
> >
> > $Self->{'Customer::AuthModule::LDAP::GroupDN'} =
> > 'CN=helpdesk_customers,OU=Groups,OU=OldTown,DC=domain,DC=win,DC=domain,DC=co
> > m';
> > $Self->{'Customer::AuthModule::LDAP::AccessAttr'} = 'member';
> > $Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN';
> >
> > # UserSyncLDAPMap
> > # (map if agent should create/synced from LDAP to DB after login must
> > match your AD)
> > $Self->{UserSyncLDAPMap} = {
> > # DB -> LDAP
> > Firstname => 'givenName',
> > Lastname => 'sn',
> > Email => 'userPrincipalName',
> > };
> >
> > # UserSyncLDAPGroups
> > # (If "LDAP" was selected for AuthModule, you can specify
> > # initial user groups for first login.)
> > $Self->{UserSyncLDAPGroups} = [
> > 'users',
> > ];
> >
> > <snip>
> > ##################### End of Config.pm ####################
> >
> > Restart OTRS and try logining in using the username you setup as the admin,
> > but use your AD password. Should work. They login as a customer using the
> > username and password that you put in the customer group in AD.
> >
> > Have Fun
> >
> > GEH
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
> > Matthew Joyce
> > Sent: Thursday, June 07, 2007 9:40 PM
> > To: otrs
> > Subject: [otrs] ORTS, LDAP and AD groups
> >
> >
> > Hi all,
> >
> > I'm having glacial progress with getting otrs (Debian) to authenticate
> > with Active Directory.
> > I've have trawled the archives and I'm still not even sure the setup
> > I'm after can be done.
> >
> > I have a standard structure of OUs
> > Customer and Agent account are distributed throughout the OUs
> > I'd like to put Agents in a group to distinguish then from Customers
> > The login IDs should be their samAccountName
> >
> > Group membership can be derived from the group attribute 'member'
> > which contains users DNs.
> >
> > here's the config...
> > $Self->{'AuthModule::LDAP::UID'} = 'samAccountName';
> > $Self->{'AuthModule::LDAP::GroupDN'} =
> > 'cn=OTRS-Agents,ou=Groups,dc=domain,dc=local';
> > $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
> > $Self->{'AuthModule::LDAP::UserAttr'} = 'distinguishedname';
> >
> > Looking at the log, it seems membership is being tested using the
> > Login ID and failing.
> >
> > Jun 8 11:37:28 vm-helpdesk OTRS-CGI-10[13668]:
> > [Notice][Kernel::System::Auth::LDAP::Auth] User: mjoyce authentication
> > failed, no LDAP group
> > entry foundGroupDN='cn=OTRS-Agents,ou=Groups,dc=domain,dc=local',
> > Filter='(member=mjoyce)'! (REMOTE_ADDR: x.x.x.x).
> >
> > Have I misunderstood how this authentication process works ?
> > Can anyone advise me ?
> >
> > Thanks
> >
> > Matt
> > _______________________________________________
> > OTRS mailing list: otrs - Webpage: http://otrs.org/
> > Archive: http://lists.otrs.org/pipermail/otrs
> > To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
> > Support or consulting for your OTRS system?
> > => http://www.otrs.com/
> >
> > _______________________________________________
> > OTRS mailing list: otrs - Webpage: http://otrs.org/
> > Archive: http://lists.otrs.org/pipermail/otrs
> > To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
> > Support or consulting for your OTRS system?
> > => http://www.otrs.com/
> >
>