- Frische OTRS 3.3.8 Installation mit ITSM auf Ubuntu Server
- Es wurden keine weiteren Änderungen an der Config vorgenommen.
- DC: Windows Server 2008 R2, in kürze jedoch 2012 R2
Mich beschäftigt jetzt eine Weile das Thema LDAP-Anbindung mit OTRS schon eine Weile. Liege ich damit richtig, dass die Config.pm im Verzeichnis /opt/otrs/Kernel/ entsprechend ergänzt werden muss? Die Default.pm soll man ja nicht ändern.
Muss der Ubuntu Server in die Domäne mit eingebunden werden?
Inzwischen sieht meine LDAP-Konfiguration folgendermaßen aus, die Anmeldung ist damit leider nicht möglich:
Code: Select all
#################################################################################
# #
# Hello @all, this LDAP-Config with works very fine with our Windows2008R2 #
# Domain and OTRS v3.1.10. All authenticated agents are syncronized with #
# the OTRS database. #
# #
#################################################################################
# ---------------------------------------------------- #
# ldap agent authentication #
# ---------------------------------------------------- #
# Net::LDAP new parameters basic settings(if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthModule::LDAP::Params'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
};
# This is an example configuration for an LDAP auth. backend.(take care that Net::LDAP is installed!)
$Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
$Self->{'AuthModule::LDAP::Host'} = '192.168.10.1';
$Self->{'AuthModule::LDAP::BaseDN'} = 'ou=Firma,dc=domain,dc=local';
$Self->{'AuthModule::LDAP::UID'} = 'sAMAccountname';
# Check if the user is allowed to auth in a posixGroup (e.g. user needs to be in a group xyz to use otrs)
$Self->{'AuthModule::LDAP::GroupDN'} = 'CN=otrs,OU=domain,DC=domain,DC=local';
$Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
# for ldap posixGroups objectclass (just uid)
#$Self->{'AuthModule::LDAP::UserAttr'} = 'sAMAccountname';
# for non ldap posixGroups objectclass (with full user dn)
$Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
# The following is valid but would only be necessary if the anonymous user do NOT have permission to read from the LDAP tree
$Self->{'AuthModule::LDAP::SearchUserDN'} = 'cn=ldap,cn=Users,dc=domain,dc=local';
$Self->{'AuthModule::LDAP::SearchUserPw'} = 'geheimeskennwort';
# ---------------------------------------------------- #
# authentication sync settings #
# (enable data sync. after succsessful authentication) #
# AGENT SYNCHRONIZATION LDAP --> OTRS DB #
# ---------------------------------------------------- #
# Net::LDAP new parameters basic settings(if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthSyncModule::LDAP::Params'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
};
# In case you need to use OTRS in iso-charset, you can define this by using this option (converts utf-8 data from LDAP to iso).
$Self->{'AuthSyncModule::LDAP::Charset'} = 'utf-8';
# This is an example configuration for an LDAP auth sync. backend.(take care that Net::LDAP is installed!)
$Self->{'AuthSyncModule'} = 'Kernel::System::Auth::Sync::LDAP';
$Self->{'AuthSyncModule::LDAP::Host'} = '192.168.10.1';
$Self->{'AuthSyncModule::LDAP::BaseDN'} = 'ou=Firma,dc=domain,dc=local';
$Self->{'AuthSyncModule::LDAP::UID'} = 'sAMAccountname';
# The following is valid but would only be necessary if the anonymous user do NOT have permission to read from the LDAP tree
$Self->{'AuthSyncModule::LDAP::SearchUserDN'} = 'cn=ldap,cn=Users,dc=domain,dc=local';
$Self->{'AuthSyncModule::LDAP::SearchUserPw'} = 'geheimeskennwort';
# UserSyncLDAPGroups(If "LDAP" was selected="selected" for AuthModule, you can specify initial user groups for first login.)
$Self->{UserSyncLDAPGroups} = [
'users',
];
# AuthSyncModule::LDAP::UserSyncMap (map if agent should create/synced from LDAP to DB after successful login)
$Self->{'AuthSyncModule::LDAP::UserSyncMap'} = {
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
};
Vielen Dank für die Hilfe!