Hallo zusammen,
seit dem Umzug meines Znuny 6.4 auf RockyLinux 9 kann ich mich mit dem Root-Benutzer nicht mehr auf der Weboberfläche anmelden.
Es kommt die Meldung: Anmeldung fehlgeschlagen! Benutzername oder Passwort wurden falsch eingegeben.
Ein ändern des Passworts von root@localhost über die Agent-Konfigurationsoberfäche bringt auch nichts.
Habt Ihr mir hier irgend einen Lösungsansatz den ich verfolgen könnte?
Grüße
Markus
Kein Zugang mit root@localhost
Re: Kein Zugang mit root@localhost
Hi,
evtl. is er invalid?
schau mal in der SQL am Bersten nach dem valid_id für den userID = 1
Oder halt mit einem Admin account in der GUI.
Hast Du ein AgentAuth backend in der Config.pm konfiguriert? Falls ja, lass sehen.
Flo
evtl. is er invalid?
schau mal in der SQL am Bersten nach dem valid_id für den userID = 1
Oder halt mit einem Admin account in der GUI.
Hast Du ein AgentAuth backend in der Config.pm konfiguriert? Falls ja, lass sehen.
Flo
OTRS 8 SILVER (Prod)
OTRS 8 auf Debian 11 (Test)
Znuny 7.x latest version testing auf Debian 11
-- Ich beantworte keine Forums-Fragen PN - No PN please
I won't answer to unfriendly users any more. A greeting and regards are just polite.
OTRS 8 auf Debian 11 (Test)
Znuny 7.x latest version testing auf Debian 11
-- Ich beantworte keine Forums-Fragen PN - No PN please
I won't answer to unfriendly users any more. A greeting and regards are just polite.
-
- Znuny newbie
- Posts: 13
- Joined: 13 Aug 2015, 15:53
- Znuny Version: 6.4.3
- Real Name: Markus Scheffold
- Company: Häussler Technische Orthopädie GmbH
- Contact:
Re: Kein Zugang mit root@localhost
Hallo Flo,
Hier ist der SELECT:
MariaDB [otrs]> select * from users where login like 'root%';
1 | root@localhost | XXXXXXXXXXXXXXXXXXXX | | Admin | OTRS | 1 | 2015-12-29 13:44:24 | 1 | 2022-11-25 13:56:06 | 2
Und hier die AgendAuth Config:
#-------------------------------------------------------------------------------------------#
# 2. hto-ulm-dc Agents Beginn #
#-------------------------------------------------------------------------------------------#
# --------------------------------------------------- #
# authentication sync settings #
# (enable agent data sync. after succsessful #
# authentication) #
# --------------------------------------------------- #
# This is an example configuration for an LDAP auth. backend.
# (Make sure Net::LDAP is installed!)
$Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
$Self->{'AuthModule::LDAP::Host'} = 'XXXXXXXXXXXXXXX.shhaeussler.lokal';
$Self->{'AuthModule::LDAP::BaseDN'} = 'ou=Haeussler,dc=shhaeussler,dc=lokal';
$Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
# Check if the user is allowed to auth in a posixGroup
# (e. g. user needs to be in a group xyz to use otrs)
$Self->{'AuthModule::LDAP::GroupDN'} = 'cn=OTRS_Agenten,ou=Gruppen,ou=Ulm,ou=Haeussler,dc=shhaeussler,dc=lokal';
$Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
# for ldap posixGroups objectclass (just uid)
# $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
# for non ldap posixGroups objectclass (with full user dn)
$Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
# The following is valid but would only be necessary if the
# anonymous user do NOT have permission to read from the LDAP tree
$Self->{'AuthModule::LDAP::SearchUserDN'} = 'otrs LDAP';
$Self->{'AuthModule::LDAP::SearchUserPw'} = 'XXXXXXXXXXXX';
# in case you want to add always one filter to each ldap query, use
# this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
$Self->{'AuthSyncModule::LDAP::AlwaysFilter'} = '(memberOf=CN=OTRS_Agenten,OU=Gruppen,OU=Ulm,OU=Haeussler,DC=shhaeussler,DC=lokal)(!(userAccountControl:1.2.840.113556.1.4.803:=2))';
# in case you want to add a suffix to each login name, then
# you can use this option. e. g. user just want to use user but
# in your ldap directory exists user@domain.
# $Self->{'AuthModule::LDAP::UserSuffix'} = '@domain.com';
# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthModule::LDAP::Params'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
};
#-------------------------------------------------------------------------------------------#
# 2. hto-ulm-dc Agents End #
#-------------------------------------------------------------------------------------------#
#-------------------------------------------------------------------------------------------#
# 3. hto-ulm-dc Agents Sync Beginn #
#-------------------------------------------------------------------------------------------#
# defines AuthSyncBackend (AuthSyncModule) for AuthModule
# if this key exists and is empty, there won't be a sync.
# example values: AuthSyncBackend, AuthSyncBackend2
$Self->{'AuthModule::UseSyncBackend'} = 'AuthSyncBackend';
#
# agent data sync against ldap
$Self->{'AuthSyncModule'} = 'Kernel::System::Auth::Sync::LDAP';
$Self->{'AuthSyncModule::LDAP::Host'} = 'XXXXXXXXXXX.shhaeussler.lokal';
$Self->{'AuthSyncModule::LDAP::BaseDN'} = 'ou=Haeussler,dc=shhaeussler,dc=lokal';
$Self->{'AuthSyncModule::LDAP::UID'} = 'sAMAccountName';
$Self->{'AuthSyncModule::LDAP::SearchUserDN'} = 'otrs LDAP';
$Self->{'AuthSyncModule::LDAP::SearchUserPw'} = 'XXXXXXXXXXXXXXX';
$Self->{'AuthSyncModule::LDAP::UserSyncMap'} = {
# DB -> LDAP
# UserTitle => '',
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
};
# AuthSyncModule::LDAP::UserSyncInitialGroups
# (sync following group with rw permission after initial create of first agent
# login)
$Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups'} = [
'users',
];
#-------------------------------------------------------------------------------------------#
# 3. hto-ulm-dc Agents Sync End #
#-------------------------------------------------------------------------------------------#
Gruß
Markus
Hier ist der SELECT:
MariaDB [otrs]> select * from users where login like 'root%';
1 | root@localhost | XXXXXXXXXXXXXXXXXXXX | | Admin | OTRS | 1 | 2015-12-29 13:44:24 | 1 | 2022-11-25 13:56:06 | 2
Und hier die AgendAuth Config:
#-------------------------------------------------------------------------------------------#
# 2. hto-ulm-dc Agents Beginn #
#-------------------------------------------------------------------------------------------#
# --------------------------------------------------- #
# authentication sync settings #
# (enable agent data sync. after succsessful #
# authentication) #
# --------------------------------------------------- #
# This is an example configuration for an LDAP auth. backend.
# (Make sure Net::LDAP is installed!)
$Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
$Self->{'AuthModule::LDAP::Host'} = 'XXXXXXXXXXXXXXX.shhaeussler.lokal';
$Self->{'AuthModule::LDAP::BaseDN'} = 'ou=Haeussler,dc=shhaeussler,dc=lokal';
$Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
# Check if the user is allowed to auth in a posixGroup
# (e. g. user needs to be in a group xyz to use otrs)
$Self->{'AuthModule::LDAP::GroupDN'} = 'cn=OTRS_Agenten,ou=Gruppen,ou=Ulm,ou=Haeussler,dc=shhaeussler,dc=lokal';
$Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
# for ldap posixGroups objectclass (just uid)
# $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
# for non ldap posixGroups objectclass (with full user dn)
$Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
# The following is valid but would only be necessary if the
# anonymous user do NOT have permission to read from the LDAP tree
$Self->{'AuthModule::LDAP::SearchUserDN'} = 'otrs LDAP';
$Self->{'AuthModule::LDAP::SearchUserPw'} = 'XXXXXXXXXXXX';
# in case you want to add always one filter to each ldap query, use
# this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
$Self->{'AuthSyncModule::LDAP::AlwaysFilter'} = '(memberOf=CN=OTRS_Agenten,OU=Gruppen,OU=Ulm,OU=Haeussler,DC=shhaeussler,DC=lokal)(!(userAccountControl:1.2.840.113556.1.4.803:=2))';
# in case you want to add a suffix to each login name, then
# you can use this option. e. g. user just want to use user but
# in your ldap directory exists user@domain.
# $Self->{'AuthModule::LDAP::UserSuffix'} = '@domain.com';
# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthModule::LDAP::Params'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
};
#-------------------------------------------------------------------------------------------#
# 2. hto-ulm-dc Agents End #
#-------------------------------------------------------------------------------------------#
#-------------------------------------------------------------------------------------------#
# 3. hto-ulm-dc Agents Sync Beginn #
#-------------------------------------------------------------------------------------------#
# defines AuthSyncBackend (AuthSyncModule) for AuthModule
# if this key exists and is empty, there won't be a sync.
# example values: AuthSyncBackend, AuthSyncBackend2
$Self->{'AuthModule::UseSyncBackend'} = 'AuthSyncBackend';
#
# agent data sync against ldap
$Self->{'AuthSyncModule'} = 'Kernel::System::Auth::Sync::LDAP';
$Self->{'AuthSyncModule::LDAP::Host'} = 'XXXXXXXXXXX.shhaeussler.lokal';
$Self->{'AuthSyncModule::LDAP::BaseDN'} = 'ou=Haeussler,dc=shhaeussler,dc=lokal';
$Self->{'AuthSyncModule::LDAP::UID'} = 'sAMAccountName';
$Self->{'AuthSyncModule::LDAP::SearchUserDN'} = 'otrs LDAP';
$Self->{'AuthSyncModule::LDAP::SearchUserPw'} = 'XXXXXXXXXXXXXXX';
$Self->{'AuthSyncModule::LDAP::UserSyncMap'} = {
# DB -> LDAP
# UserTitle => '',
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
};
# AuthSyncModule::LDAP::UserSyncInitialGroups
# (sync following group with rw permission after initial create of first agent
# login)
$Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups'} = [
'users',
];
#-------------------------------------------------------------------------------------------#
# 3. hto-ulm-dc Agents Sync End #
#-------------------------------------------------------------------------------------------#
Gruß
Markus
Re: Kein Zugang mit root@localhost
Hi,
der nimmt nur LDAP als Auth Backend.
Du brauchst zusätzlich ein Auth::DB damit er auch die lokale Datenbank verwendet.
zum Beispiel
Flo
der nimmt nur LDAP als Auth Backend.
Du brauchst zusätzlich ein Auth::DB damit er auch die lokale Datenbank verwendet.
zum Beispiel
Code: Select all
$Self->{'AuthModule'} = 'Kernel::System::Auth::DB';
OTRS 8 SILVER (Prod)
OTRS 8 auf Debian 11 (Test)
Znuny 7.x latest version testing auf Debian 11
-- Ich beantworte keine Forums-Fragen PN - No PN please
I won't answer to unfriendly users any more. A greeting and regards are just polite.
OTRS 8 auf Debian 11 (Test)
Znuny 7.x latest version testing auf Debian 11
-- Ich beantworte keine Forums-Fragen PN - No PN please
I won't answer to unfriendly users any more. A greeting and regards are just polite.
-
- Znuny newbie
- Posts: 13
- Joined: 13 Aug 2015, 15:53
- Znuny Version: 6.4.3
- Real Name: Markus Scheffold
- Company: Häussler Technische Orthopädie GmbH
- Contact:
Re: Kein Zugang mit root@localhost
Hi genau das wars.
$Self->{'AuthModule2'} = 'Kernel::System::Auth::DB';
Danke
$Self->{'AuthModule2'} = 'Kernel::System::Auth::DB';
Danke