Re: [otrs] Need to set customers/agents's auth witn LDAP.

2013-02-07 Thread Steven Carr
On 7 February 2013 16:56, Israel Garcia  wrote:
> HI,
>
> From the manual, I see I have to add all these lines to get agents and
> customers authenticating with ldap (AD), but not sure if we have to add it
> to /opt/otrs/Kernel/Config.pm or /opt/otrs/Kernel/Config/Default.pm? Or in
> other place.

/opt/otrs/Kernel/Config.pm - your settings/overrides go in here
/opt/otrs/Kernel/Config/Default.pm - you should not modify this config
file *at all*

Steve
-
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs


Re: [otrs] Need to set customers/agents's auth witn LDAP.

2013-02-07 Thread Gerald Young
don't change defaults.pm only config.pm


On Thu, Feb 7, 2013 at 11:56 AM, Israel Garcia  wrote:

> HI,
>
> From the manual, I see I have to add all these lines to get agents and
> customers authenticating with ldap (AD), but not sure if we have to add it
> to /opt/otrs/Kernel/Config.pm or /opt/otrs/Kernel/Config/Default.pm? Or in
> other place.
>
> For agents:
> # This is an example configuration for an LDAP auth. backend.
> # (Make sure Net::LDAP is installed!)
> $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
> $Self->{'AuthModule::LDAP::Host'} = 'israelDC2.israel.NET';
> $Self->{'AuthModule::LDAP::BaseDN'} =
> 'cn=otrs_allow_company,ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
> $Self->{'AuthModule::LDAP::UID'} = 'uid';
>
> # Check if the user is allowed to auth in a posixGroup
> # (e. g. user needs to be in a group xyz to use otrs)
> $Self->{'AuthModule::LDAP::GroupDN'} =
> 'ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
> $Self->{'AuthModule::LDAP::AccessAttr'} = 'memberUid';
> # for ldap posixGroups objectclass (just uid)
> #  $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
> # for non ldap posixGroups objectclass (with full user dn)
> #  $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
>
> # The following is valid but would only be necessary if the
> # anonymous user do NOT have permission to read from the LDAP tree
> $Self->{'AuthModule::LDAP::SearchUserDN'} = 'otrs_ldap';
> $Self->{'AuthModule::LDAP::SearchUserPw'} = 'OTRisrael24';
>
> # in case you want to add always one filter to each ldap query, use
> # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter =>
> '(objectclass=user)'
> $Self->{'AuthModule::LDAP::AlwaysFilter'} = '';
>
> # in case you want to add a suffix to each login name, then
> # you can use this option. e. g. user just want to use user but
> # in your ldap directory exists user@domain.
> #$Self->{'AuthModule::LDAP::UserSuffix'} = '@israel.domain';
>
> # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
> $Self->{'AuthModule::LDAP::Params'} = {
> port => 389,
> timeout => 120,
> async => 0,
> version => 3,
> };
>
>
> For customers:
> # This is an example configuration for an LDAP auth. backend.
> # (make sure Net::LDAP is installed!)
> $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
> $Self->{'Customer::AuthModule::LDAP::Host'} = 'israelDC2.israel.NET';
> $Self->{'Customer::AuthModule::LDAP::BaseDN'} =
> 'cn=otrs_allow_israel,ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
> $Self->{'Customer::AuthModule::LDAP::UID'} = 'uid';
>
> # Check if the user is allowed to auth in a posixGroup
> # (e. g. user needs to be in a group xyz to use otrs)
> $Self->{'Customer::AuthModule::LDAP::GroupDN'} =
> 'ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
> $Self->{'Customer::AuthModule::LDAP::AccessAttr'} = 'memberUid';
> # for ldap posixGroups objectclass (just uid)
> $Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'UID';
> # for non ldap posixGroups objectclass (full user dn)
> #$Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN';
>
> # The following is valid but would only be necessary if the
> # anonymous user does NOT have permission to read from the LDAP tree
> $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'otrs_ldap';
> $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'OTRisrael24';
>
> # in case you want to add always one filter to each ldap query, use
> # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter =>
> '(objectclass=user)'
> $Self->{'Customer::AuthModule::LDAP::AlwaysFilter'} = '';
>
> # in case you want to add a suffix to each customer login name, then
> # you can use this option. e. g. user just want to use user but
> # in your ldap directory exists user@domain.
> #$Self->{'Customer::AuthModule::LDAP::UserSuffix'} = '@israel.domain';
>
> # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
> $Self->{'Customer::AuthModule::LDAP::Params'} = {
> port => 389,
> timeout => 120,
> async => 0,
> version => 3,
> };
>
> Thanks once more.
> regards
> Israel.
>
> -
> OTRS mailing list: otrs - Webpage: http://otrs.org/
> Archive: http://lists.otrs.org/pipermail/otrs
> To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs
>
-
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs

[otrs] Need to set customers/agents's auth witn LDAP.

2013-02-07 Thread Israel Garcia
HI,

From the manual, I see I have to add all these lines to get agents and 
customers authenticating with ldap (AD), but not sure if we have to add it to 
/opt/otrs/Kernel/Config.pm or /opt/otrs/Kernel/Config/Default.pm? Or in other 
place.


For agents:
# This is an example configuration for an LDAP auth. backend.
# (Make sure Net::LDAP is installed!)
$Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
$Self->{'AuthModule::LDAP::Host'} = 'israelDC2.israel.NET';
$Self->{'AuthModule::LDAP::BaseDN'} = 
'cn=otrs_allow_company,ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
$Self->{'AuthModule::LDAP::UID'} = 'uid';

# Check if the user is allowed to auth in a posixGroup
# (e. g. user needs to be in a group xyz to use otrs)
$Self->{'AuthModule::LDAP::GroupDN'} = 
'ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
$Self->{'AuthModule::LDAP::AccessAttr'} = 'memberUid';
# for ldap posixGroups objectclass (just uid)
#  $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
# for non ldap posixGroups objectclass (with full user dn)
#  $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';

# The following is valid but would only be necessary if the
# anonymous user do NOT have permission to read from the LDAP tree
$Self->{'AuthModule::LDAP::SearchUserDN'} = 'otrs_ldap';
$Self->{'AuthModule::LDAP::SearchUserPw'} = 'OTRisrael24';

# in case you want to add always one filter to each ldap query, use
# this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => 
'(objectclass=user)'
$Self->{'AuthModule::LDAP::AlwaysFilter'} = '';

# in case you want to add a suffix to each login name, then
# you can use this option. e. g. user just want to use user but
# in your ldap directory exists user@domain.
#    $Self->{'AuthModule::LDAP::UserSuffix'} = '@israel.domain';

# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthModule::LDAP::Params'} = {
    port => 389,
    timeout => 120,
    async => 0,
    version => 3,
};



For customers:
# This is an example configuration for an LDAP auth. backend.
# (make sure Net::LDAP is installed!)
$Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
$Self->{'Customer::AuthModule::LDAP::Host'} = 'israelDC2.israel.NET';
$Self->{'Customer::AuthModule::LDAP::BaseDN'} = 
'cn=otrs_allow_israel,ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
$Self->{'Customer::AuthModule::LDAP::UID'} = 'uid';

# Check if the user is allowed to auth in a posixGroup
# (e. g. user needs to be in a group xyz to use otrs)
$Self->{'Customer::AuthModule::LDAP::GroupDN'} = 
'ou=generics,ou=usuaris,ou=israel,dc=israel,dc=net';
$Self->{'Customer::AuthModule::LDAP::AccessAttr'} = 'memberUid';
# for ldap posixGroups objectclass (just uid)
$Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'UID';
# for non ldap posixGroups objectclass (full user dn)
#$Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN';

# The following is valid but would only be necessary if the
# anonymous user does NOT have permission to read from the LDAP tree
$Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'otrs_ldap';
$Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'OTRisrael24';

# in case you want to add always one filter to each ldap query, use
# this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => 
'(objectclass=user)'
$Self->{'Customer::AuthModule::LDAP::AlwaysFilter'} = '';

# in case you want to add a suffix to each customer login name, then
# you can use this option. e. g. user just want to use user but
# in your ldap directory exists user@domain.
#$Self->{'Customer::AuthModule::LDAP::UserSuffix'} = '@israel.domain';

# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'Customer::AuthModule::LDAP::Params'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
};


Thanks once more.
regards
Israel.
-
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs

Re: [otrs] Can't connect to: http://otrs.org/product.xml (500 Can't connect to otrs.org:80 (Connection refused)) (SOLVED)

2013-02-07 Thread Israel Garcia
Hi Michiel,

I forgot to say the list the issue was solved.

Thanks much!




 De: Michiel Beijen 
Para: Israel Garcia ; User questions and discussions about 
OTRS.  
Enviado: Miércoles 6 de febrero de 2013 17:45
Asunto: Re: [otrs] Can't connect to: http://otrs.org/product.xml (500 Can't 
connect to otrs.org:80 (Connection refused))
 
Hi,

On Wed, Feb 6, 2013 at 5:40 PM, Israel Garcia  wrote:

> Very nice, only one question, does it admit user/password with the URL, I
> mean:
>
> http://myuser:passwd@myproxy:myport/

Have you tried?
Yes it does!

--
Michiel-
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs

[otrs] Resetting a Dynamic Field when Escalation Update timer resets

2013-02-07 Thread Praneeth Katru
Hello,

 

I have created a Dynamic Field for managing multiple escalation levels which
is working fine. 

 

But I want to change its value to a preset value whenever escalation update
timer is reset. How can this be accomplished?

 

Thanks

Praneeth Katru

 

Description: cid:Image0

Empowering Enterprise Efficiency

 

Q4-A1 | 10th Floor | Cyber Towers | Hi-Tech City | Madhapur | Hyderabad-500
081 | India | Office:91-40-44335055 | US Direct:609-454-6901 |

 

  praneeth.ka...@smartims.com |
 www.SmartIMS.com

 

An MWBE and "GSA Schedule 70" Certified Company

 

 

Description: cid:Image1
 Description: cid:Image2

Description: cid:Image3
 Description: cid:Image4Description: cid:Image5

 

<>
<>
<>
<>
<>


image006.png
Description: Binary data
-
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs

[otrs] answer from ticket + pdf files + firefox

2013-02-07 Thread Emilia Starzak
Hi,

Step 1: i have a ticket in otrs
Step 2: i choose empty answer
Step 3: attach pdf file to my answer
Step 4: send

We noticed that agents which useing firefox sent blank files. Capacity of sent 
file and recieved file is the same… but in recieved everything is white. The 
same file in otrs interface is ok, we can download it and see properly.
We tested that on chrome and ie, and problem doeasent exist. Only firefox.

Anyone noticed that?
Emi
-
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs

Re: [otrs] 3.1.x

2013-02-07 Thread Steve Clark

On 02/07/2013 02:50 AM, Martin Gruner wrote:

Hi Steve,

our unit tests show that this combination works fine.

Regards, mg

Am 06.02.13 20:21, schrieb Steve Clark:

Hello,

Has anyone successfully used 3.1.x with postgresql 9.2.x

Thanks,

Hi Martin,

thanks for the info and  taking the time to reply.

Regards,

--
Stephen Clark

-
OTRS mailing list: otrs - Webpage: http://otrs.org/
Archive: http://lists.otrs.org/pipermail/otrs
To unsubscribe: http://lists.otrs.org/cgi-bin/listinfo/otrs