We are currently evaluating OTRS and version 2.4.1. We are using MSAD for the
majority of the users and OpenLdap for another set of users. I have configured
the Config.pm file as shown in the
http://faq.otrs.org/otrs/public.pl?Action=PublicFAQ&ItemID=219. A user MSAD can
authenticate but a user in OpenLdap can not.
The log shows both tries for the MSAD user but stops once it fails for the
OpenLdap user with an incorrect password for the MSAD provider, but it does not
check the Openldap. The reverse is true if we swap the providers and OpenLdap
is first and MSAD is second. Then OpenLdap users are authenticated and MSAD
users are not.
How do we get FAQ messages updated,
http://faq.otrs.org/otrs/public.pl?Action=PublicFAQ&ItemID=219 is out of date?
Thanks
Wayne
Below is an example of the error
[Fri Jul 24 09:46:59 2009][Notice][Kernel::System::Auth::DB::Auth] User: "ABC"
authentication with wrong Pw!!! (REMOTE_ADDR: XXX)
[Fri Jul 24 09:46:59 2009][Notice][Kernel::System::Auth::LDAP::Auth] User:
"ABC" authentication failed, no LDAP entry found! "MSAD base info"
(REMOTE_ADDR: XXX).
[Fri Jul 24 09:46:59 2009][Notice][Kernel::System::Auth::DB::Auth] User: "ABC"
authentication with wrong Pw!!! (REMOTE_ADDR: XXX)
Below are the settings in the config.pm with MSAD first
# Authentication backend Auth #
# ---------------------------------------------------- #
#------------------------------------------------------#
#***** aus MSAD
#------------------------------------------------------#
#Enable LDAP authentication for Customers / Users
$Self->{'AuthModule1'} = 'Kernel::System::Auth::LDAP';
$Self->{'AuthModule::LDAP::Host1'} = 'XXXXXX';
$Self->{'AuthModule::LDAP::BaseDN1'} = 'XXXXXX';
#$Self->{'AuthModule::LDAP::UID1'} = 'cn';
$Self->{'AuthModule::LDAP::UID1'} = 'sAMAccountName';
#The following is valid but would only be necessary if the
#anonymous user do NOT have permission to read from the LDAP tree
$Self->{'AuthModule::LDAP::SearchUserDN1'} = 'XXXXXX';
$Self->{'AuthModule::LDAP::SearchUserPw1'} = 'XXXXXX';
#Add the following lines when only users are allowed to login if they
reside in the spicified security group
#Remove these lines if you want to provide login to all users specified in
the User Base DN
$Self->{'AuthModule::LDAP::GroupDN1'} ='XXXXXX';
$Self->{'AuthModule::LDAP::AccessAttr1'} = 'member';
$Self->{'AuthModule::LDAP::UserAttr1'} = 'DN';
# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthModule::LDAP::Params1'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
};
$Self->{'AuthModule::LDAP::Die1'} = 1;
#------------------------------------------------------#
#***** OpenLDAP
#------------------------------------------------------#
#Enable LDAP authentication for Customers / Users
$Self->{'AuthModule2'} = 'Kernel::System::Auth::LDAP';
$Self->{'AuthModule::LDAP::Host2'} = 'YYYYYYY';
$Self->{'AuthModule::LDAP::BaseDN2'} = 'YYYYYYY';
#$Self->{'AuthModule::LDAP::UID2'} = 'cn';
$Self->{'AuthModule::LDAP::UID2'} = 'cssDisplayNameDefault';
#The following is valid but would only be necessary if the
#anonymous user do NOT have permission to read from the LDAP tree
$Self->{'AuthModule::LDAP::SearchUserDN2'} = 'YYYYYYY';
$Self->{'AuthModule::LDAP::SearchUserPw2'} = 'YYYYYYY';
#Add the following lines when only users are allowed to login if they
reside in the spicified security group
#Remove these lines if you want to provide login to all users specified in
the User Base DN
$Self->{'AuthModule::LDAP::GroupDN2'} ='YYYYYYY';
$Self->{'AuthModule::LDAP::AccessAttr2'} = 'UniqueMember';
$Self->{'AuthModule::LDAP::UserAttr2'} = 'DN';
# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthModule::LDAP::Params2'} = {
port => 58089,
timeout => 120,
async => 0,
version => 3,
};
$Self->{'AuthModule::LDAP::Die2'} = 1;
# ---------------------------------------------------- #
# Auth Sync Backend #
# ---------------------------------------------------- #
#------------------------------------------------------#
#***** MSAD
#------------------------------------------------------#
## agent data sync against ldap
#$Self->{'AuthSyncModule'}
$Self->{'AuthSyncModule1'} = 'Kernel::System::Auth::Sync::LDAP';
$Self->{'AuthSyncModule::LDAP::Host1'} = 'XXXX';
$Self->{'AuthSyncModule::LDAP::BaseDN1'} = 'XXXXX';
$Self->{'AuthSyncModule::LDAP::UID1'} = 'sAMAccountName';
$Self->{'AuthSyncModule::LDAP::SearchUserDN1'} = 'XXXXX';
$Self->{'AuthSyncModule::LDAP::SearchUserPw1'} = 'XXXX';
$Self->{'AuthSyncModule::LDAP::UserSyncMap1'} = {
## DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
};
## AuthSyncModule::LDAP::UserSyncInitialGroups
## (sync following group with rw permission after initial create of first
agent
## login)
$Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups1'} = [
'users','admin','stats'
];
$Self->{'AuthSyncModule::LDAP::Die1'} = 1;
#------------------------------------------------------#
#***** OpenLDAP
#------------------------------------------------------#
## agent data sync against ldap
#$Self->{'AuthSyncModule'}
$Self->{'AuthSyncModule2'} = 'Kernel::System::Auth::Sync::LDAP';
$Self->{'AuthSyncModule::LDAP::Host2'} = 'YYYYYYY';
$Self->{'AuthSyncModule::LDAP::BaseDN2'} = ' YYYYYYY';
$Self->{'AuthSyncModule::LDAP::UID2'} = 'cssDisplayNameDefault';
$Self->{'AuthSyncModule::LDAP::SearchUserDN2'} = ' YYYYYYY';
$Self->{'AuthSyncModule::LDAP::SearchUserPw2'} = ' YYYYYYY';
$Self->{'AuthSyncModule::LDAP::Params2'} = {
port => 58089,
timeout => 120,
async => 0,
version => 3,
};
$Self->{'AuthSyncModule::LDAP::UserSyncMap2'} = {
## DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
};
## AuthSyncModule::LDAP::UserSyncInitialGroups
## (sync following group with rw permission after initial create of first
agent
## login)
$Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups2'} = [
'users','admin','stats'
];
$Self->{'AuthSyncModule::LDAP::Die2'} = 1;
____________________________________________________________________________________
Access Yahoo!7 Mail on your mobile. Anytime. Anywhere.
Show me how: http://au.mobile.yahoo.com/mail---------------------------------------------------------------------
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
NEW! ENTERPRISE SUBSCRIPTION - Get more information NOW!
http://www.otrs.com/en/support/enterprise-subscription/