Note:This package is outdated. Starting with V4.0, it's functionality will be covered by package auth-ldap-adldapsearch.
This package establishes an interface between ]po[ and the OpenLDAP authentication infrastructure using the âldapsearchâ command line tool from the âOpenLDAPâ Linux RPM.
The "ldapsearch" tool is available in two versions with completely incompatible command line parameters:
For the purpose of this ]project-open[ LDAP package we need version 2.4, To check if you got the right version please enter:
# ldapsearch -VVAs a result, you should get a total of three lines with a first line similar to "ldapsearch: @(#) $OpenLDAP: ldapsearch 2.4.21 (...)",
The package âauth-ldap-openldapâ is available from CVS only at the moment. You can obtain the software via CVS if you are running an earlier version of ]po[:
# cd /web/projop/packages # cvs -d :pserver:firstname.lastname@example.org:/cvsroot/ checkout auth-ldap-openldap
The required "OpenLDAP" Linux RPM is part of all major Linux distributions and included in the ]po[ VMware installers. OpenLDAP is a stable package with few changes in the last years, so most versions of it should work together with ]po[.
Please make sure the package are available in the /packages/ directory of your ]po[ installation. Then go to /acs-admin/apm/ URL and select âInstall New Packagesâ and select the package for installation. Restart the server and go back again to /acs-admin/apm/ and check that the package is available.
Please uninstall any other "auth-*" package before installing auth-ldap-openldap, otherwise you will get an error message talking about duplicate values.
Before configuring the LDAP module, we recommend that you test the LDAP connection manually using the command line. ]po[ relies on the âldapsearchâ command line tool to establish a connection to the LDAP server, so you can test the connection manually before configuring ]po[.
To check the validity of a username/password combination, we use the âldapsearch ânâ comand, which doesnât perform any specific action, but returns an error if the username/password combination is wrong. An example call of the tool may look like this:
# ldapsearch -n -x -H ldap://ldap.project-open.net -D "cn=Manager,dc=whp,dc=fr" "uid=bbigboss" -w secret
In this example, ldap.project-open.net is your ldap server, "bbigboss" is the user_id of the user and "secrect" is a valid password for bbigboss.
This command should return a 0 return code and a first line NOT containing âInvalid credentials (49)â. For details please see the ldapsearch âmanâ page for details.
Once your command line works, you can setup a new OpenACS âAuthentication Authorityâ. This object controls the authentication of users:
Please go to Admin -> Parameters -> Kernel Parameters and set the parameter UseEmailForLoginP to 0. With "username" instead of "email" enabled for user login, the login screen will now show an additional drop-down box for the selection of the [Authentication Authority].
Before testing your new login method, please go to "My Account" and click on the "Edit" button of the user "Basic Information" and check the value of "Username". Otherwise you may lock yourself out!
# cd /web/projop/log # tail -f error.log | grep ldapsearch
This command will give you only the calls to âldapsearchâ. Copy & past these lines and execute them manually in the command line in order to drill-down further.
Open Discussion Forum