This is one of mine in case you wanted to compare:

     # AD/LDAP - working on and may explode at any point (I put this here
because our domain admins like to move objects at will).
     $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
     $Self->{'AuthModule::LDAP::Host'} = 'corp.blahblah.com';
     $Self->{'AuthModule::LDAP::BaseDN'} = 'dc=corp,dc=blahblah,dc=com';
     $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
     $Self->{'AuthModule::LDAP::SearchUserDN'} =  'CN=otrs_svcs,OU=Service
Accounts,DC=corp,DC=blahblah,DC=com';
     $Self->{'AuthModule::LDAP::SearchUserPw'} = 'password';
     $Self->{'Customer::AuthModule'} =
'Kernel::System::CustomerAuth::LDAP';
     $Self->{'Customer::AuthModule::LDAP::Host'} = 'corp.blahblah.com';
     $Self->{'Customer::AuthModule::LDAP::BaseDN'} =
'dc=corp,dc=blahblah,dc=com';
     $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
     $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} =
'CN=otrs_svcs,OU=Service Accounts,DC=corp,DC=blahblah,DC=com';
     $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'password';


     $Self->{CustomerUser} = {
     Name => 'blahblah AD',
     Module => 'Kernel::System::CustomerUser::LDAP',
     Params => {
       Host => 'corp.blahblah.com',
       BaseDN => 'ou=blahblah Employees,dc=corp,dc=gtsi,dc=com',
       SSCOPE => 'sub',
       AlwaysFilter => '(&(sAMAccountName=*)(mail=*))',
       UserDN => 'CN=otrs_svcs,OU=Service
Accounts,DC=corp,DC=blahblah,DC=com',
       UserPw => 'password',
     },
CustomerKey => 'sAMAccountName',
     CustomerID => 'mail',
     CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
     CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
     CustomerUserPostMasterSearchFields => ['mail'],
     CustomerUserNameFields => ['givenname', 'sn'],
     Map => [
       # note: Login, Email and CustomerID needed!
       # var, frontend, storage, shown, required, storage-type
       [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
       [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
       [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
       [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
       [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
     ],
   };
# UserSyncLDAPMap
    # (map if agent should create/synced from LDAP to DB after login)
    $Self->{UserSyncLDAPMap} = {
        # DB -> LDAP
        Firstname => 'givenName',
        Lastname => 'sn',
        Email => 'mail',
    };

    # UserSyncLDAPGroups
    # (If "LDAP" was selected for AuthModule, you can specify
    # initial user groups for first login.)
    $Self->{UserSyncLDAPGroups} = [
        'Domain Users',
    ];

    # UserTable
    $Self->{DatabaseUserTable} = 'system_user';
    $Self->{DatabaseUserTableUserID} = 'id';
    $Self->{DatabaseUserTableUserPW} = 'pw';
    $Self->{DatabaseUserTableUser} = 'login';
}


On 9/21/07 2:48 PM, "Robert Aldridge" <[EMAIL PROTECTED]> wrote:

> Finally got it working...
> 
> I changed every entry of:
> 
> 'cn=OTRS Admin,ou=Tuscaloosa - Sheet Mill,dc=tsteel,dc=com';
> 
> to:
> 
> 'tsteel\OTRS'
> 
> and, to pull user data to the local DB, I added:
> 
>     # UserSyncLDAPMap
>     # (map if agent should create/synced from LDAP to DB after login)
>     $Self->{UserSyncLDAPMap} = {
>         # DB -> LDAP
>         Firstname => 'givenName',
>         Lastname => 'sn',
>         Email => 'mail',
>     };
> 
>     # UserSyncLDAPGroups
>     # (If "LDAP" was selected for AuthModule, you can specify initial
>     # user groups for first login.)
>     $Self->{UserSyncLDAPGroups} = [
>         'users',
>     ];
> 
> 
> Perhaps this will help someone else who's trying to set OTRS up with Microsoft
> Active Directory.
> 
> Thanks,
> 
> Robert Aldridge
> 
> 
> 
> On 9/21/07, Robert Aldridge <[EMAIL PROTECTED]> wrote:
>> Hi folks,
>> 
>> First let me say that OTRS appears to be a great product!  Kudos to the
>> developers!
>> 
>> We are in the process of evaluating our options for a helpdesk/trouble-ticket
>> system.  I would really like to give OTRS a good evaluation, but I'm having
>> some problems.  Our chosen solution must be able to authenticate users (both
>> agents and customers) via Microsoft Active Directory.  It appears that this
>> is possible, but I've yet to have any success.  I'll outline the steps I've
>> taken and solicit any input from the community.
>> 
>> OTRS is working fine when authenticating against it's own database.  Here's
>> what I've done to try to authenticate against AD:
>> 
>> I edited Kernel/Config.pm and added:
>> 
>> <begin additions to Config.pm <http://Config.pm> >
>> 
>>     $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
>>     $Self->{'AuthModule::LDAP::Host'} = ' lincoln.tsteel.com
>> <http://lincoln.tsteel.com> ';
>>     $Self->{'AuthModule::LDAP::BaseDN'} = 'ou=Tuscaloosa - Sheet
>> Mill,dc=tsteel,dc=com';
>>     $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
>>     $Self->{'AuthModule::LDAP::SearchUserDN'} = 'cn=OTRS Admin,ou=Tuscaloosa
>> - Sheet Mill,dc=tsteel,dc=com';
>>     $Self->{'AuthModule::LDAP::SearchUserPw'} = 'password';
>> 
>>     $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
>>     $Self->{'Customer::AuthModule::LDAP::Host'} = ' lincoln.tsteel.com
>> <http://lincoln.tsteel.com> ';
>>     $Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'ou=Tuscaloosa - Sheet
>> Mill,dc=tsteel,dc=com';
>>     $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
>>     $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'cn=OTRS
>> Admin,ou=Tuscaloosa - Sheet Mill,dc=tsteel,dc=com';
>>     $Self->{'Customer::AuthModule::LDAP::SearchUserPW'} = 'password';
>> 
>>     $Self->{CustomerUser} = {
>>     Module => 'Kernel::System::CustomerUser::LDAP',
>>     Params => {
>>     Host => ' lincoln.tsteel.com <http://lincoln.tsteel.com> ',
>>     BaseDN => 'ou=Tuscaloosa - Sheet Mill,dc=tsteel,dc=com',
>>     SSCOPE => 'sub',
>>     UserDN => 'cn=OTRS Admin,ou=Tuscaloosa - Sheet Mill,dc=tsteel,dc=com',
>>     UserPW => 'password',
>>     },
>>     CustomerKey => 'sAMAccountName',
>>     CustomerID => 'mail',
>>     CustomerUserListFields => 'sAMAccountName', 'cn', 'mail',
>>     CustomerUserSearchFields => 'sAMAccountName', 'cn', 'mail',
>>     CustomerUserPostMasterSearchFields => 'mail',
>>     CustomerUserNameFields => 'givenname', 'sn',
>>     Map => [
>>     [ 'UserFirstName', 'Firstname', 'givenname', 1, 1, 'var' ],
>>     [ 'UserLastName', 'Lastname', 'sn', 1, 1, 'var' ],
>>     [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
>>     [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
>>     [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
>>     ],
>>     };
>> 
>> <end additions to Config.pm <http://Config.pm> >
>> 
>> 
>> On my AD box, I ran: ldifde -f users.ldf -d "OU=Tuscaloosa - Sheet
>> Mill,dc=tsteel,dc=com" -r "<objectClass=user>"
>> 
>> Which returned a listing of all users in the Tuscaloosa - Sheet Mill org
>> unit.  Within the users.ldf file (output from the above command), there's an
>> entry for OTRS Admin:
>> 
>> <begin snippet from users.ldf>
>> 
>>     dn: CN=OTRS,OU=Tuscaloosa - Sheet Mill,DC=tsteel,DC=com
>>     changetype: add
>>     objectClass: top
>>     objectClass: person
>>     objectClass: organizationalPerson
>>     objectClass: user
>>     cn: OTRS
>>     sn: Admin
>>     givenName: OTRS
>>     distinguishedName: CN=OTRS,OU=Tuscaloosa - Sheet Mill,DC=tsteel,DC=com
>>     instanceType: 4
>>     whenCreated: 20070920125829.0Z
>>     whenChanged: 20070921135825.0Z
>>     displayName: OTRS
>>     uSNCreated: 8512826
>>     uSNChanged: 8549454
>>     name: OTRS
>>     objectGUID:: po7FpWyIxEWWQeiUc9XMwA==
>>     userAccountControl: 66048
>>     badPwdCount: 0
>>     codePage: 0
>>     countryCode: 0
>>     badPasswordTime: 128347689772801250
>>     lastLogoff: 0
>>     lastLogon: 128347693211238750
>>     pwdLastSet: 128347667099207500
>>     primaryGroupID: 513
>>     objectSid:: AQUAAAAAAAUVAAAApR5XA/l+DSsgfDsl4xwAAA==
>>     accountExpires: 9223372036854775807
>>     logonCount: 0
>>     sAMAccountName: OTRS
>>     sAMAccountType: 805306368
>>     userPrincipalName: [EMAIL PROTECTED]
>>     objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=tsteel,DC=com
>>     dSCorePropagationData: 20070921135825.0Z
>>     dSCorePropagationData: 20070921135825.0Z
>>     dSCorePropagationData: 20070921135825.0Z
>>     dSCorePropagationData: 20070921131751.0Z
>>     dSCorePropagationData: 16010108151056.0Z
>>     lastLogonTimestamp: 128347680934676250
>> 
>> 
>> <end snippet from users.ldf>
>> 
>> 
>> With this configuration, when I attempt to login as an agent using my
>> username (which I know is valid in AD), it errors out with:
>> 
>> Login failed! Your username or password was entered incorrectly.
>> 
>> And, when I revert the Config.pm <http://Config.pm>  back (so I can log in)
>> and check the system log, I see:
>> 
>> User: raldridge authentication failed, no LDAP entry
>> found!BaseDN='ou=Tuscaloosa - Sheet Mill,dc=tsteel,dc=com',
>> Filter='(sAMAccountName=raldridge)', (REMOTE_ADDR: 10.1.1.50
>> <http://10.1.1.50> ).
>> 
>> Any help would be greatly appreciated.
>> 
>> Thanks,
>> 
>> Robert Aldridge
>> 
> 
> 
> _______________________________________________
> OTRS mailing list: otrs - Webpage: http://otrs.org/
> Archive: http://lists.otrs.org/pipermail/otrs
> To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
> Support or consulting for your OTRS system?
> => http://www.otrs.com/

-Andy Lubel
-- 


_______________________________________________
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
Support or consulting for your OTRS system?
=> http://www.otrs.com/

Reply via email to