Sorry much *appreciated*.
However, I have not been able to login as a customer yet.
I used you kindly provided config, and really the only parts I changed
are those which pertain to my setup.

ldaphost,ldapuser,ldapuserpw, basedn, agent group dn, and user group dn.

I can login as an Agent, but not as a customer.
Here's the log output....

I login...
Kernel::System::Auth::LDAP::Auth] User: mjoyce (CN=Matt
Joyce,OU=IT,OU=Operations,OU
=xxxx,DC=xxxx,DC=xxxx) authentication ok (REMOTE_ADDR: xxx.xxx.xxx.xxx).

I logout....
[Notice][Kernel::System::AuthSession::DB::RemoveSessionID] Removed
SessionID 10ac457be93b8d79
1d1529f8552d0b0c13.

I try as customer...
[Notice][Kernel::System::Auth::LDAP::Auth] User: mjoyce.test
authentication failed, no LDAP group entry foundGroup
DN='cn=OTRS-Agents,ou=Groups,dc=xxxx,dc=xxxx',
Filter='(member=CN=mjoyce.test,OU=IT,OU=Operations,OU=xxxx,DC=xxx
,DC=xxxx)'! (REMOTE_ADDR: xxx.xxx.xxx.xxx).

To me this seem right my customer account mjoyce.test is not a member
of the agent group.
But why doesn't it test (and report in the log file) against the customer group.

Have I completely misunderstood something, customers are able to login
to login via the web right ?

thanks



On 6/12/07, Matthew Joyce <[EMAIL PROTECTED]> wrote:
Much unappreciated Greg, I'm going to work through this today.
I have the Agent group working, but not the customer group.

With your setup, are Agents in both groups?

Thanks


On 6/8/07, Greg Horne <[EMAIL PROTECTED]> wrote:
>
>
> Sorry to hear its going slow.  Had fun also with getting it to work using
> AD. You did not include all of your config for LDAP, so I'll just cover a
> few general things.
>
> Setup a user account that can browse AD's LDAP.  (username - OTRS_Account
> password - whatever) you may want to make it never expire.
>
> Setup two groups, one for Customers and one for Agents.
>
> Make AD users members of the Customers group.
>
> Add AD users to the Agents group that you want to use the system as an
> agent.
>
> Create a user in OTRS and add to the admin group using the same username
> that you intend to login to AD with.
>
> Modify your Config.pm file adding the following to allow agents and
> customers/users to login using LDAP.  Modify for your structure.  Taken from
> my setup, add and modify as needed.  Just an example:
> ############## Start of Config.pm  ################
> <snip>
>
>     #we want to use LDAP for Auth
>     $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
>     $Self->{'AuthModule::LDAP::Host'} = 'ldap.domain.com';
>     $Self->{'AuthModule::LDAP::BaseDN'} =
> 'dc=domainname,dc=win,dc=domain,dc=com';
>     $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
>     #The username and password of the user you setup to access LDAP
> information in AD
>     $Self->{'AuthModule::LDAP::SearchUserDN'} =
> 'CN=otrs_helpdesk,OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com';
>     $Self->{'AuthModule::LDAP::SearchUserPw'} = 'whateverYourPasswordIs';
>
>     #We want our Customer/users to Auth using LDAP
>     $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
>
>     $Self->{'Customer::AuthModule::LDAP::Host'} = 'ldap.domain.com';
>     $Self->{'Customer::AuthModule::LDAP::BaseDN'} =
> 'OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com';
>     $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
>     $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} =
> 'CN=otrs_helpdesk,OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com';
>     $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} =
> 'whateverYourPasswordIs';
>
>     $Self->{CustomerUser} = {
>       Module => 'Kernel::System::CustomerUser::LDAP',
>       Params => {
>       Host => 'ldap.domain.com',
>       BaseDN => 'OU=Users,OU=OldTown,DC=domain,DC=win,DC=domain,DC=com',
>       SSCOPE => 'sub',
>       UserDN =>
> 'CN=otrs_helpdesk,OU=Users,OU=OldTown,DC=ot,DC=win,DC=domain,DC=com',
>       UserPw => 'whateverYourPasswordIs',
>     },
>     CustomerKey => 'sAMAccountName',
>     CustomerID => 'userPrincipalName',
>     CustomerUserListFields => ['displayName', 'userPrincipalName'],
>     CustomerUserSearchFields => ['displayName', 'userPrincipalName'],
>     CustomerUserPostMasterSearchFields => userPrincipalName,
>     CustomerUserNameFields => ['givenName', 'sn'],
>     #the following must map to valid fields in your AD
> (givenname,sn,sAMAccountName,...)
>     Map => [
>       [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
>       [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
>       [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
>       [ 'UserEmail', 'Email', 'userPrincipalName', 1, 1, 'var' ],
>       [ 'UserCustomerID', 'CustomerID', 'userPrincipalName', 0, 1, 'var' ],
>     ],
>   };
>
>
>   #OK now lets have our agents use LDAP
>   $Self->{'AuthModule::LDAP::GroupDN'} =
> 'CN=helpdesk_agents,OU=Groups,OU=OldTown,DC=domain,DC=win,DC=domain,DC=com';
>   $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
>   $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
>
>
>
>   $Self->{'Customer::AuthModule::LDAP::GroupDN'} =
> 'CN=helpdesk_customers,OU=Groups,OU=OldTown,DC=domain,DC=win,DC=domain,DC=co
> m';
>   $Self->{'Customer::AuthModule::LDAP::AccessAttr'} = 'member';
>   $Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN';
>
>   # UserSyncLDAPMap
>   # (map if agent should create/synced from LDAP to DB after login must
> match your AD)
>   $Self->{UserSyncLDAPMap} = {
>   # DB -> LDAP
>      Firstname => 'givenName',
>      Lastname => 'sn',
>      Email => 'userPrincipalName',
>   };
>
>     # UserSyncLDAPGroups
>     # (If "LDAP" was selected for AuthModule, you can specify
>     # initial user groups for first login.)
>     $Self->{UserSyncLDAPGroups} = [
>         'users',
>     ];
>
> <snip>
> #####################  End of Config.pm  ####################
>
> Restart OTRS and try logining in using the username you setup as the admin,
> but use your AD password.  Should work.  They login as a customer using the
> username and password that you put in the customer group in AD.
>
> Have Fun
>
> GEH
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
> Matthew Joyce
> Sent: Thursday, June 07, 2007 9:40 PM
> To: otrs
> Subject: [otrs] ORTS, LDAP and AD groups
>
>
> Hi all,
>
> I'm having glacial progress with getting otrs (Debian) to authenticate
> with Active Directory.
> I've have trawled the archives and I'm still not even sure the setup
> I'm after can be done.
>
> I have a standard structure of OUs
> Customer and Agent account are distributed throughout the OUs
> I'd like to put Agents in a group to distinguish then from Customers
> The login IDs should be their samAccountName
>
> Group membership can be derived from the group attribute 'member'
> which contains users DNs.
>
> here's the config...
>     $Self->{'AuthModule::LDAP::UID'} = 'samAccountName';
>     $Self->{'AuthModule::LDAP::GroupDN'} =
> 'cn=OTRS-Agents,ou=Groups,dc=domain,dc=local';
>     $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
>     $Self->{'AuthModule::LDAP::UserAttr'} = 'distinguishedname';
>
> Looking at the log, it seems membership is being tested using the
> Login ID and failing.
>
> Jun  8 11:37:28 vm-helpdesk OTRS-CGI-10[13668]:
> [Notice][Kernel::System::Auth::LDAP::Auth] User: mjoyce authentication
> failed, no LDAP group
>  entry foundGroupDN='cn=OTRS-Agents,ou=Groups,dc=domain,dc=local',
> Filter='(member=mjoyce)'! (REMOTE_ADDR: x.x.x.x).
>
> Have I misunderstood how this authentication process works ?
> Can anyone advise me ?
>
> Thanks
>
> Matt
> _______________________________________________
> OTRS mailing list: otrs - Webpage: http://otrs.org/
> Archive: http://lists.otrs.org/pipermail/otrs
> To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
> Support or consulting for your OTRS system?
> => http://www.otrs.com/
>
> _______________________________________________
> OTRS mailing list: otrs - Webpage: http://otrs.org/
> Archive: http://lists.otrs.org/pipermail/otrs
> To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
> Support or consulting for your OTRS system?
> => http://www.otrs.com/
>

_______________________________________________
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
Support or consulting for your OTRS system?
=> http://www.otrs.com/

Reply via email to