I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Moderator: crythias

Locked
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Master Guru Cryrhias, I have been trying this for 3 days in row with no success.
Want to:-
1. enable my domain users to login with their current credential

Error: from Log

[Wed Oct 30 23:06:20 2013][Notice][Kernel::System::CustomerAuth::DB::Auth] CustomerUser: No auth record in 'customer_user' for 'mgotova' (REMOTE_ADDR: 192.168.10.242)

below is my config.pm file. Please help thanks :)

===============

Code: Select all

package Kernel::Config;

use strict;
use warnings;
use utf8;

sub Load {
    my $Self = shift;

    # ---------------------------------------------------- #
    # database settings                                    #
    # ---------------------------------------------------- #

    # The database host
    $Self->{'DatabaseHost'} = 'localhost';

    # The database name
    $Self->{'Database'} = "otrs";

    # The database user
    $Self->{'DatabaseUser'} = "otrs";

    # The password of database user. You also can use bin/otrs.CryptPassword.pl
    # for crypted passwords
    $Self->{'DatabasePw'} = 'g9CW6RLuj6sUWAMs';

    # The database DSN for MySQL ==> more: "perldoc DBD::mysql"
    $Self->{'DatabaseDSN'} = "DBI:mysql:database=$Self->{Database};host=$Self->{DatabaseHost}";

    # The database DSN for PostgreSQL ==> more: "perldoc DBD::Pg"
    # if you want to use a local socket connection
#    $Self->{DatabaseDSN} = "DBI:Pg:dbname=$Self->{Database};";
    # if you want to use a TCP/IP connection
#    $Self->{DatabaseDSN} = "DBI:Pg:dbname=$Self->{Database};host=$Self->{DatabaseHost};";
    # if you have PostgresSQL 8.1 or earlier, activate the legacy driver with this line:
#    $Self->{DatabasePostgresqlBefore82} = 1;

    # The database DSN for Microsoft SQL Server - only supported if OTRS is
    # installed on Windows as well
#    $Self->{DatabaseDSN} = "DBI:ODBC:driver={SQL Server};Database=$Self->{Database};Server=$Self->{DatabaseHost},1433";

    # The database DSN for Oracle ==> more: "perldoc DBD::oracle"
#    $ENV{ORACLE_HOME} = '/u01/app/oracle/product/10.2.0/client_1';
#    $ENV{NLS_DATE_FORMAT} = 'YYYY-MM-DD HH24:MI:SS';
#    $ENV{NLS_LANG} = "american_america.utf8";

#    $Self->{DatabaseDSN} = "DBI:Oracle:sid=OTRS;host=$Self->{DatabaseHost};port=1522;";

    # ---------------------------------------------------- #
    # fs root directory
    # ---------------------------------------------------- #
    $Self->{Home} = 'C:/otrs/OTRS';

    # ---------------------------------------------------- #
    # insert your own config settings "here"               #
    # config settings taken from Kernel/Config/Defaults.pm #
    # ---------------------------------------------------- #
    # $Self->{SessionUseCookie} = 0;
    # $Self->{CheckMXRecord} = 0;

    # ---------------------------------------------------- #

    # ---------------------------------------------------- #
    # data inserted by installer                           #
    # ---------------------------------------------------- #

    $Self->{'LogModule'}          = 'Kernel::System::Log::File';
    $Self->{'LogModule::LogFile'} = 'C:/otrs/OTRS/var/log/otrs.log';
    # $DIBI$

  # This is an example configuration for an LDAP auth. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthModule1'} = 'Kernel::System::Auth::LDAP';
   $Self->{'AuthModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthModule::LDAP::BaseDN1'} = 'dc=superman,dc=net';
   $Self->{'AuthModule::LDAP::UID1'} = 'sAMAccountNama';

    # Check if the user is allowed to auth in a posixGroup
    # (e. g. user needs to be in a group xyz to use otrs)
   #$Self->{'AuthModule::LDAP::GroupDN'} = 'cn=OTRSSEARCH,ou=users,dc=superman,dc=net';
   #$Self->{'AuthModule::LDAP::AccessAttr'} = 'memberUid';
    # for ldap posixGroups objectclass (just uid)
#    $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
    # for non ldap posixGroups objectclass (with full user dn)
#    $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=superman,DC=net';
   $Self->{'AuthModule::LDAP::SearchUserPw1'} = 'Qwer1234';

    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
    #$Self->{'AuthModule::LDAP::AlwaysFilter'} = '*';

    # in case you want to add a suffix to each login name, then
    # you can use this option. e. g. user just want to use user but
    # in your ldap directory exists user@domain.
#    $Self->{'AuthModule::LDAP::UserSuffix'} = '@domain.com';

    # In case you want to convert all given usernames to lower letters you
    # should activate this option. It might be helpfull if databases are
    # in use that do not distinguish selects for upper and lower case letters
    # (Oracle, postgresql). User might be synched twice, if this option
    # is not in use.
#    $Self->{'AuthModule::LDAP::UserLowerCase'} = 0;

    # In case you need to use OTRS in iso-charset, you can define this
    # by using this option (converts utf-8 data from LDAP to iso).
#    $Self->{'AuthModule::LDAP::Charset'} = 'iso-8859-1';

    # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
   $Self->{'AuthModule::LDAP::Params'} = {
       port    => 389,
       timeout => 120,
       async   => 0,
       version => 3,
   };
   # --------------------------------------------------- #
    # authentication sync settings                        #
    # (enable agent data sync. after succsessful          #
    # authentication)                                     #
    # --------------------------------------------------- #
    # This is an example configuration for an LDAP auth sync. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthSyncModule1'} = 'Kernel::System::Auth::Sync::LDAP';
   $Self->{'AuthSyncModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthSyncModule::LDAP::BaseDN1'} = 'dc=superman,dc=net';
   $Self->{'AuthSyncModule::LDAP::UID1'} = 'sAMAccountName';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthSyncModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=superman,DC=net';
   $Self->{'AuthSyncModule::LDAP::SearchUserPw1'} = 'Qwer1234';

    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
#    $Self->{'AuthSyncModule::LDAP::AlwaysFilter'} = '';

    # AuthSyncModule::LDAP::UserSyncMap
    # (map if agent should create/synced from LDAP to DB after successful login)
    $Self->{'AuthSyncModule::LDAP::UserSyncMap1'} = {
       # DB -> LDAP
       UserFirstname => 'givenName',
       UserLastname  => 'sn',
       UserEmail     => 'mail',
   };

    # In case you need to use OTRS in iso-charset, you can define this
    # by using this option (converts utf-8 data from LDAP to iso).
#    $Self->{'AuthSyncModule::LDAP::Charset'} = 'iso-8859-1';

    # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
   $Self->{'AuthSyncModule::LDAP::Params1'} = {
       port    => 389,
       timeout => 120,
       async   => 0,
       version => 3,
   };


   
   
    # Die if backend can't work, e. g. can't connect to server.
#    $Self->{'AuthSyncModule::LDAP::Die'} = 1;
 # ----------------------------------------------------   #
# OTRS Active Directory Integration Backed DB Customers  #
# ----------------------------------------------------   #

    $Self->{CustomerUser1} = {
        Name => 'SGL Users',
        Module => 'Kernel::System::CustomerUser::LDAP',
        Params => {
            Host => 'torsvdct02.superman.net',
            BaseDN => 'dc=superman,dc=net',
            SSCOPE => 'sub',
            UserDN => 'CN=OTRS SEARCH,CN=Users,DC=superman,DC=net',
            UserPw => 'Qwer1234',
            AlwaysFilter => '',
            Params => {
                port => 389,
                timeout => 120,
                async => 0,
                version => 3,
            },
        },
        CustomerKey => 'sAMAccountName',
        CustomerID => 'mail',
        CustomerUserListFields => ['cn', 'mail'],
        CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
        CustomerUserSearchListLimit => 250,
        CustomerUserPostMasterSearchFields => ['mail'],
        CustomerUserNameFields => ['givenname', 'sn'],
        CustomerUserExcludePrimaryCustomerID => 0,
        AdminSetPreferences => 0,
        Map => [
           [ 'UserSalutation', 'Title',      'title',           1, 0, 'var', '', 0 ],
            [ 'UserFirstname',  'Firstname',  'givenname',       1, 1, 'var', '', 0 ],
            [ 'UserLastname',   'Lastname',   'sn',              1, 1, 'var', '', 0 ],
            [ 'UserLogin',      'Username',   'sAMAccountName',             1, 1, 'var', '', 0 ],
            [ 'UserEmail',      'Email',      'mail',            1, 1, 'var', '', 0 ],
            [ 'UserCustomerID', 'CustomerID', 'mail',            0, 1, 'var', '', 0 ],
            [ 'UserPhone',      'Phone',      'telephonenumber', 1, 0, 'var', '', 0 ],
            [ 'UserAddress',    'Address',    'postaladdress',   1, 0, 'var', '', 0 ],
            [ 'UserComment',    'Comment',    'description',     1, 0, 'var', '', 0 ],
        ],
    };  
    # Die if backend can't work, e. g. can't connect to server.
#    $Self->{'AuthModule::LDAP::Die'} = 1;
    # ---------------------------------------------------- #
    # ---------------------------------------------------- #
    #                                                      #
    # end of your own config options!!!                    #
    #                                                      #
    # ---------------------------------------------------- #
    # ---------------------------------------------------- #
}

# ---------------------------------------------------- #
# needed system stuff (don't edit this)                #
# ---------------------------------------------------- #
use strict;
use warnings;

use vars qw(@ISA);

use Kernel::Config::Defaults;
push (@ISA, 'Kernel::Config::Defaults');

# -----------------------------------------------------#

1;
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

undefeated wrote:enable my domain users to login with their current credential
undefeated wrote:Kernel::System::CustomerAuth::DB
viewtopic.php?f=60&t=16543

It seems you have no CustomerAuth in Config.pm
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Guru Crythias,

can you kindly post the script on how to do Kernel::System::CustomerAuth::DB? i am a total Newbie here.. thanks a million.
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

All the documentation is linked from the above link

Including Customer user authentication against an LDAP backend
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

thank you very much i finally got it to work :)
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

question..

1. how to use Microsoft Active Directory as a source for OTRS "Agents" or users.
2. If the users are the memeber of OTRS-Agent, i want their account to be created automatically.
3. according the the picture attach is my setting below correct?
$Self->{'AuthModule::LDAP::GroupDN'} = 'cn=OTRS-Agents,ou=Security Groups,ou=Users,ou=People,dc=xxxxxxx,dc=net';

thanks in advance Guru
You do not have the required permissions to view the files attached to this post.
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

undefeated wrote: If the users are the memeber of OTRS-Agent, i want their account to be created automatically.
http://doc.otrs.org/3.1/en/html/auth-ba ... ckend-ldap
undefeated wrote:according the the picture attach is my setting below correct?
$Self->{'AuthModule::LDAP::GroupDN'} = 'cn=OTRS-Agents,ou=Security Groups,ou=Users,ou=People,dc=xxxxxxx,dc=net';
yes? But make sure the index number (append 1?) matches the other entries for AuthModule::LDAP in your Config.pm
Don't forget the $Self->{'AuthModule::LDAP::AccessAttr'} to indicate the membership attribute that means "member of GroupDN" ... try "member" instead of uid.
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

i must be missing something... thanks for your time crythias

Code: Select all

  # This is an example configuration for an LDAP auth. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthModule1'} = 'Kernel::System::Auth::LDAP';
   $Self->{'AuthModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
   $Self->{'AuthModule::LDAP::UID1'} = 'sAMAccountNama';
 

    # Check if the user is allowed to auth in a posixGroup
    # (e. g. user needs to be in a group xyz to use otrs)
   $Self->{'AuthModule::LDAP::GroupDN1'} = 'cn=OTRS-Agents,ou=Security Groups,ou=Users,ou=People,dc=somersetent,dc=net';
   $Self->{'AuthModule::LDAP::AccessAttr1'} = 'member';
    # for ldap posixGroups objectclass (just uid)
#    $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
    # for non ldap posixGroups objectclass (with full user dn)
   $Self->{'AuthModule::LDAP::UserAttr1'} = 'DN';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=somersetent,DC=net';
   $Self->{'AuthModule::LDAP::SearchUserPw1'} = 'Qwer1234';

    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
   $Self->{'AuthModule::LDAP::AlwaysFilter1'} = '';
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

I'm missing ...
AuthSyncModule
and $Self->{'AuthModule::UseSyncBackend1'} = 'AuthSyncBackend';
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Crythias, i am so lost in the Woods...LOL, below is my complete config.pm file where should insert those scripts you mention? :) thanks

Code: Select all

# --
# Kernel/Config.pm - Config file for OTRS kernel
# Copyright (C) 2001-2013 xxx, http://otrs.org/
# --
# This software comes with ABSOLUTELY NO WARRANTY. For details, see
# the enclosed file COPYING for license information (AGPL). If you
# did not receive this file, see http://www.gnu.org/licenses/agpl.txt.
# --
#  Note:
#
#  -->> Most OTRS configuration should be done via the OTRS web interface
#       and the SysConfig. Only for some configuration, such as database
#       credentials and customer data source changes, you should edit this
#       file. For changes do customer data sources you can copy the definitions
#       from Kernel/Config/Defaults.pm and paste them in this file.
#       Config.pm will not be overwritten when updating OTRS.
# --

package Kernel::Config;

use strict;
use warnings;
use utf8;

sub Load {
    my $Self = shift;

    # ---------------------------------------------------- #
    # database settings                                    #
    # ---------------------------------------------------- #

    # The database host
    $Self->{'DatabaseHost'} = 'localhost';

    # The database name
    $Self->{'Database'} = "otrs";

    # The database user
    $Self->{'DatabaseUser'} = "otrs";

    # The password of database user. You also can use bin/otrs.CryptPassword.pl
    # for crypted passwords
    $Self->{'DatabasePw'} = 'g9CW6RLuj6sUWAMs';

    # The database DSN for MySQL ==> more: "perldoc DBD::mysql"
    $Self->{'DatabaseDSN'} = "DBI:mysql:database=$Self->{Database};host=$Self->{DatabaseHost}";

    # The database DSN for PostgreSQL ==> more: "perldoc DBD::Pg"
    # if you want to use a local socket connection
#    $Self->{DatabaseDSN} = "DBI:Pg:dbname=$Self->{Database};";
    # if you want to use a TCP/IP connection
#    $Self->{DatabaseDSN} = "DBI:Pg:dbname=$Self->{Database};host=$Self->{DatabaseHost};";
    # if you have PostgresSQL 8.1 or earlier, activate the legacy driver with this line:
#    $Self->{DatabasePostgresqlBefore82} = 1;

    # The database DSN for Microsoft SQL Server - only supported if OTRS is
    # installed on Windows as well
#    $Self->{DatabaseDSN} = "DBI:ODBC:driver={SQL Server};Database=$Self->{Database};Server=$Self->{DatabaseHost},1433";

    # The database DSN for Oracle ==> more: "perldoc DBD::oracle"
#    $ENV{ORACLE_HOME} = '/u01/app/oracle/product/10.2.0/client_1';
#    $ENV{NLS_DATE_FORMAT} = 'YYYY-MM-DD HH24:MI:SS';
#    $ENV{NLS_LANG} = "american_america.utf8";

#    $Self->{DatabaseDSN} = "DBI:Oracle:sid=OTRS;host=$Self->{DatabaseHost};port=1522;";

    # ---------------------------------------------------- #
    # fs root directory
    # ---------------------------------------------------- #
    $Self->{Home} = 'C:/otrs/OTRS';

    # ---------------------------------------------------- #
    # insert your own config settings "here"               #
    # config settings taken from Kernel/Config/Defaults.pm #
    # ---------------------------------------------------- #
    # $Self->{SessionUseCookie} = 0;
    # $Self->{CheckMXRecord} = 0;

    # ---------------------------------------------------- #

    # ---------------------------------------------------- #
    # data inserted by installer                           #
    # ---------------------------------------------------- #

    $Self->{'LogModule'}          = 'Kernel::System::Log::File';
    $Self->{'LogModule::LogFile'} = 'C:/otrs/OTRS/var/log/otrs.log';
    # $DIBI$

  # This is an example configuration for an LDAP auth. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthModule1'} = 'Kernel::System::Auth::LDAP';
   $Self->{'AuthModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
   $Self->{'AuthModule::LDAP::UID1'} = 'sAMAccountName';
   
    # Check if the user is allowed to auth in a posixGroup
    # (e. g. user needs to be in a group xyz to use otrs)
   $Self->{'AuthModule::LDAP::GroupDN1'} = 'cn=OTRS-Agents,ou=Security Groups,ou=Users,ou=People,dc=XXXXXXX,dc=net';
   $Self->{'AuthModule::LDAP::AccessAttr1'} = 'member';
    # for ldap posixGroups objectclass (just uid)
#    $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
    # for non ldap posixGroups objectclass (with full user dn)
   $Self->{'AuthModule::LDAP::UserAttr1'} = 'DN';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net';
   $Self->{'AuthModule::LDAP::SearchUserPw1'} = 'Qwer1234';

 
    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
   $Self->{'AuthModule::LDAP::AlwaysFilter1'} = '';

    # in case you want to add a suffix to each login name, then
    # you can use this option. e. g. user just want to use user but
    # in your ldap directory exists user@domain.
#    $Self->{'AuthModule::LDAP::UserSuffix'} = '@domain.com';

    # In case you want to convert all given usernames to lower letters you
    # should activate this option. It might be helpfull if databases are
    # in use that do not distinguish selects for upper and lower case letters
    # (Oracle, postgresql). User might be synched twice, if this option
    # is not in use.
#    $Self->{'AuthModule::LDAP::UserLowerCase'} = 0;

    # In case you need to use OTRS in iso-charset, you can define this
    # by using this option (converts utf-8 data from LDAP to iso).
#    $Self->{'AuthModule::LDAP::Charset'} = 'iso-8859-1';

    # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
   $Self->{'AuthModule::LDAP::Params'} = {
       port    => 389,
       timeout => 120,
       async   => 0,
       version => 3,
   };
   # --------------------------------------------------- #
    # authentication sync settings                        #
    # (enable agent data sync. after succsessful          #
    # authentication)                                     #
    # --------------------------------------------------- #
    # This is an example configuration for an LDAP auth sync. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthModule::UseSyncBackend1'} = 'AuthSyncBackend';
   $Self->{'AuthSyncModule1'} = 'Kernel::System::Auth::Sync::LDAP';
   $Self->{'AuthSyncModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthSyncModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
   $Self->{'AuthSyncModule::LDAP::UID1'} = 'sAMAccountName';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthSyncModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net';
   $Self->{'AuthSyncModule::LDAP::SearchUserPw1'} = 'Qwer1234';

    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
#    $Self->{'AuthSyncModule::LDAP::AlwaysFilter'} = '';

    # AuthSyncModule::LDAP::UserSyncMap
    # (map if agent should create/synced from LDAP to DB after successful login)
    $Self->{'AuthSyncModule::LDAP::UserSyncMap1'} = {
       # DB -> LDAP
       UserFirstname => 'givenName',
       UserLastname  => 'sn',
       UserEmail     => 'mail',
   };

    # In case you need to use OTRS in iso-charset, you can define this
    # by using this option (converts utf-8 data from LDAP to iso).
#    $Self->{'AuthSyncModule::LDAP::Charset'} = 'iso-8859-1';

    # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
   $Self->{'AuthSyncModule::LDAP::Params1'} = {
       port    => 389,
       timeout => 120,
       async   => 0,
       version => 3,
   };
   
   
    # Die if backend can't work, e. g. can't connect to server.
#    $Self->{'AuthSyncModule::LDAP::Die'} = 1;
 # ----------------------------------------------------   #
# OTRS Active Directory Integration Backed DB Customers  #
# ----------------------------------------------------   #
# This is an example configuration for an LDAP auth. backend.
# (make sure Net::LDAP is installed!)
$Self->{'Customer::AuthModule1'} = 'Kernel::System::CustomerAuth::LDAP';
$Self->{'Customer::AuthModule::LDAP::Host1'} = 'localhost';
$Self->{'Customer::AuthModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
$Self->{'Customer::AuthModule::LDAP::UID1'} = 'sAMAccountName';



#$Self->{'Customer::AuthModule::LDAP::AccessAttr1'} = 'member';



# Check if the user is allowed to auth in a posixGroup
# (e. g. user needs to be in a group xyz to use otrs)
#$Self->{'Customer::AuthModule::LDAP::GroupDN1'} = 'cn=OTRSSEARCH,ou=users,dc=XXXXXXX,dc=net';
#$Self->{'Customer::AuthModule::LDAP::AccessAttr1'} = 'memberUid';
# for ldap posixGroups objectclass (just uid)
#$Self->{'Customer::AuthModule::LDAP::UserAttr1'} = 'UID';
# for non ldap posixGroups objectclass (full user dn)
#$Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN';

# The following is valid but would only be necessary if the
# anonymous user does NOT have permission to read from the LDAP tree
$Self->{'Customer::AuthModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net';
$Self->{'Customer::AuthModule::LDAP::SearchUserPw1'} = 'Qwer1234';

# in case you want to add always one filter to each ldap query, use
# this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
#$Self->{'Customer::AuthModule::LDAP::AlwaysFilter1'} = '(mail=*)';

# in case you want to add a suffix to each customer login name, then
# you can use this option. e. g. user just want to use user but
# in your ldap directory exists user@domain.
#$Self->{'Customer::AuthModule::LDAP::UserSuffix'} = '@domain.com';

# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'Customer::AuthModule::LDAP::Params1'} = {
    port => 389,
    timeout => 120,
    async => 0,
    version => 3,
};
    $Self->{'CustomerUser1'} = {
        Name => 'SGL Users',
        Module => 'Kernel::System::CustomerUser::LDAP',
        Params => {
            Host => 'torsvdct02.XXXXXXX.net',
            BaseDN => 'dc=XXXXXXX,dc=net',
            SSCOPE => 'sub',
            UserDN => 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net',
            UserPw => 'Qwer1234',
            AlwaysFilter => '',
            Params => {
                port => 389,
                timeout => 120,
                async => 0,
                version => 3,
            },
        },
        CustomerKey => 'sAMAccountName',
        CustomerID => 'mail',
        CustomerUserListFields => ['cn', 'mail'],
        CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
        CustomerUserSearchListLimit => 250,
        CustomerUserPostMasterSearchFields => ['mail'],
        CustomerUserNameFields => ['givenname', 'sn'],
        CustomerUserExcludePrimaryCustomerID => 0,
        AdminSetPreferences => 0,
        Map => [
           [ 'UserSalutation', 'Title',      'title',           1, 0, 'var', '', 0 ],
            [ 'UserFirstname',  'Firstname',  'givenname',       1, 1, 'var', '', 0 ],
            [ 'UserLastname',   'Lastname',   'sn',              1, 1, 'var', '', 0 ],
            [ 'UserLogin',      'Username',   'sAMAccountName',             1, 1, 'var', '', 0 ],
            [ 'UserEmail',      'Email',      'mail',            1, 1, 'var', '', 0 ],
            [ 'UserCustomerID', 'CustomerID', 'mail',            0, 1, 'var', '', 0 ],
            [ 'UserPhone',      'Phone',      'telephonenumber', 1, 0, 'var', '', 0 ],
            [ 'UserAddress',    'Address',    'postaladdress',   1, 0, 'var', '', 0 ],
            [ 'UserComment',    'Comment',    'description',     1, 0, 'var', '', 0 ],
        ],
    };  
    # Die if backend can't work, e. g. can't connect to server.
#    $Self->{'AuthModule::LDAP::Die'} = 1;
    # ---------------------------------------------------- #
    # ---------------------------------------------------- #
    #                                                      #
    # end of your own config options!!!                    #
    #                                                      #
    # ---------------------------------------------------- #
    # ---------------------------------------------------- #
}

# ---------------------------------------------------- #
# needed system stuff (don't edit this)                #
# ---------------------------------------------------- #
use strict;
use warnings;

use vars qw(@ISA);

use Kernel::Config::Defaults;
push (@ISA, 'Kernel::Config::Defaults');

# -----------------------------------------------------#

1;
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Guru i have another issue
when i click on reply by using template, and after i click on submit, i got this
You do not have the required permissions to view the files attached to this post.
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

sorry this is the error from log

[Fri Nov 1 00:36:47 2013][Error][Kernel::System::Email::Sendmail::Send][63] No such binary: /usr/sbin/sendmail!
[Fri Nov 1 00:36:47 2013][Info][Kernel::System::Email::Send] Error sending message
[Fri Nov 1 00:38:11 2013][Error][Kernel::System::Email::Sendmail::Send][63] No such binary: /usr/sbin/sendmail!
[Fri Nov 1 00:38:11 2013][Info][Kernel::System::Email::Send] Error sending message
[Fri Nov 1 00:38:11 2013][Error][Kernel::System::Ticket::Article::ArticleSend][2071] Impossible to send message to: "test test" <dfoo@inbox.com> .
[Fri Nov 1 00:39:49 2013][Error][Kernel::System::Email::Sendmail::Send][63] No such binary: /usr/sbin/sendmail!
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

Impossible to send means ... erm. um... what it said, and the logs say, "Hey, You know that method to send? Yeah... well, I don't have it in the path in SysConfig..."
You're using Windows? OK, then you should change the sendmail to SMTP. In SysConfig.
undefeated wrote: i am so lost in the Woods
Me, too. I don't know the problem you're currently experiencing but I have the code you're using to get that result...
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

crythias wrote: I have the code you're using to get that result...
Read: You've only provided me the code YOU are using to get a result that YOU encounter that you haven't told me what the *current* issue is with YOUR code.

I don't have anything besides what you've posted.
crythias wrote: I don't know the problem you're currently experiencing
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Crythias

you said i am missing....

AuthSyncModule
and $Self->{'AuthModule::UseSyncBackend1'} = 'AuthSyncBackend';

i dont know where to put those or insert to where in my config.pm file.
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

First you posted this:

Code: Select all

  # This is an example configuration for an LDAP auth. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthModule1'} = 'Kernel::System::Auth::LDAP';
   $Self->{'AuthModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
   $Self->{'AuthModule::LDAP::UID1'} = 'sAMAccountNama';


    # Check if the user is allowed to auth in a posixGroup
    # (e. g. user needs to be in a group xyz to use otrs)
   $Self->{'AuthModule::LDAP::GroupDN1'} = 'cn=OTRS-Agents,ou=Security Groups,ou=Users,ou=People,dc=somersetent,dc=net';
   $Self->{'AuthModule::LDAP::AccessAttr1'} = 'member';
    # for ldap posixGroups objectclass (just uid)
#    $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
    # for non ldap posixGroups objectclass (with full user dn)
   $Self->{'AuthModule::LDAP::UserAttr1'} = 'DN';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=somersetent,DC=net';
   $Self->{'AuthModule::LDAP::SearchUserPw1'} = 'Qwer1234';

    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
   $Self->{'AuthModule::LDAP::AlwaysFilter1'} = '';
without a practical discussion of what you need to fix.
then you posted this

Code: Select all

# --
# Kernel/Config.pm - Config file for OTRS kernel
# Copyright (C) 2001-2013 xxx, http://otrs.org/
# --
# This software comes with ABSOLUTELY NO WARRANTY. For details, see
# the enclosed file COPYING for license information (AGPL). If you
# did not receive this file, see http://www.gnu.org/licenses/agpl.txt.
# --
#  Note:
#
#  -->> Most OTRS configuration should be done via the OTRS web interface
#       and the SysConfig. Only for some configuration, such as database
#       credentials and customer data source changes, you should edit this
#       file. For changes do customer data sources you can copy the definitions
#       from Kernel/Config/Defaults.pm and paste them in this file.
#       Config.pm will not be overwritten when updating OTRS.
# --

package Kernel::Config;

use strict;
use warnings;
use utf8;

sub Load {
    my $Self = shift;

    # ---------------------------------------------------- #
    # database settings                                    #
    # ---------------------------------------------------- #

    # The database host
    $Self->{'DatabaseHost'} = 'localhost';

    # The database name
    $Self->{'Database'} = "otrs";

    # The database user
    $Self->{'DatabaseUser'} = "otrs";

    # The password of database user. You also can use bin/otrs.CryptPassword.pl
    # for crypted passwords
    $Self->{'DatabasePw'} = 'g9CW6RLuj6sUWAMs';

    # The database DSN for MySQL ==> more: "perldoc DBD::mysql"
    $Self->{'DatabaseDSN'} = "DBI:mysql:database=$Self->{Database};host=$Self->{DatabaseHost}";

    # The database DSN for PostgreSQL ==> more: "perldoc DBD::Pg"
    # if you want to use a local socket connection
#    $Self->{DatabaseDSN} = "DBI:Pg:dbname=$Self->{Database};";
    # if you want to use a TCP/IP connection
#    $Self->{DatabaseDSN} = "DBI:Pg:dbname=$Self->{Database};host=$Self->{DatabaseHost};";
    # if you have PostgresSQL 8.1 or earlier, activate the legacy driver with this line:
#    $Self->{DatabasePostgresqlBefore82} = 1;

    # The database DSN for Microsoft SQL Server - only supported if OTRS is
    # installed on Windows as well
#    $Self->{DatabaseDSN} = "DBI:ODBC:driver={SQL Server};Database=$Self->{Database};Server=$Self->{DatabaseHost},1433";

    # The database DSN for Oracle ==> more: "perldoc DBD::oracle"
#    $ENV{ORACLE_HOME} = '/u01/app/oracle/product/10.2.0/client_1';
#    $ENV{NLS_DATE_FORMAT} = 'YYYY-MM-DD HH24:MI:SS';
#    $ENV{NLS_LANG} = "american_america.utf8";

#    $Self->{DatabaseDSN} = "DBI:Oracle:sid=OTRS;host=$Self->{DatabaseHost};port=1522;";

    # ---------------------------------------------------- #
    # fs root directory
    # ---------------------------------------------------- #
    $Self->{Home} = 'C:/otrs/OTRS';

    # ---------------------------------------------------- #
    # insert your own config settings "here"               #
    # config settings taken from Kernel/Config/Defaults.pm #
    # ---------------------------------------------------- #
    # $Self->{SessionUseCookie} = 0;
    # $Self->{CheckMXRecord} = 0;

    # ---------------------------------------------------- #

    # ---------------------------------------------------- #
    # data inserted by installer                           #
    # ---------------------------------------------------- #

    $Self->{'LogModule'}          = 'Kernel::System::Log::File';
    $Self->{'LogModule::LogFile'} = 'C:/otrs/OTRS/var/log/otrs.log';
    # $DIBI$

  # This is an example configuration for an LDAP auth. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthModule1'} = 'Kernel::System::Auth::LDAP';
   $Self->{'AuthModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
   $Self->{'AuthModule::LDAP::UID1'} = 'sAMAccountName';
   
    # Check if the user is allowed to auth in a posixGroup
    # (e. g. user needs to be in a group xyz to use otrs)
   $Self->{'AuthModule::LDAP::GroupDN1'} = 'cn=OTRS-Agents,ou=Security Groups,ou=Users,ou=People,dc=XXXXXXX,dc=net';
   $Self->{'AuthModule::LDAP::AccessAttr1'} = 'member';
    # for ldap posixGroups objectclass (just uid)
#    $Self->{'AuthModule::LDAP::UserAttr'} = 'UID';
    # for non ldap posixGroups objectclass (with full user dn)
   $Self->{'AuthModule::LDAP::UserAttr1'} = 'DN';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net';
   $Self->{'AuthModule::LDAP::SearchUserPw1'} = 'Qwer1234';


    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
   $Self->{'AuthModule::LDAP::AlwaysFilter1'} = '';

    # in case you want to add a suffix to each login name, then
    # you can use this option. e. g. user just want to use user but
    # in your ldap directory exists user@domain.
#    $Self->{'AuthModule::LDAP::UserSuffix'} = '@domain.com';

    # In case you want to convert all given usernames to lower letters you
    # should activate this option. It might be helpfull if databases are
    # in use that do not distinguish selects for upper and lower case letters
    # (Oracle, postgresql). User might be synched twice, if this option
    # is not in use.
#    $Self->{'AuthModule::LDAP::UserLowerCase'} = 0;

    # In case you need to use OTRS in iso-charset, you can define this
    # by using this option (converts utf-8 data from LDAP to iso).
#    $Self->{'AuthModule::LDAP::Charset'} = 'iso-8859-1';

    # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
   $Self->{'AuthModule::LDAP::Params'} = {
       port    => 389,
       timeout => 120,
       async   => 0,
       version => 3,
   };
   # --------------------------------------------------- #
    # authentication sync settings                        #
    # (enable agent data sync. after succsessful          #
    # authentication)                                     #
    # --------------------------------------------------- #
    # This is an example configuration for an LDAP auth sync. backend.
    # (take care that Net::LDAP is installed!)
   $Self->{'AuthModule::UseSyncBackend1'} = 'AuthSyncBackend';
   $Self->{'AuthSyncModule1'} = 'Kernel::System::Auth::Sync::LDAP';
   $Self->{'AuthSyncModule::LDAP::Host1'} = 'localhost';
   $Self->{'AuthSyncModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
   $Self->{'AuthSyncModule::LDAP::UID1'} = 'sAMAccountName';

    # The following is valid but would only be necessary if the
    # anonymous user do NOT have permission to read from the LDAP tree
   $Self->{'AuthSyncModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net';
   $Self->{'AuthSyncModule::LDAP::SearchUserPw1'} = 'Qwer1234';

    # in case you want to add always one filter to each ldap query, use
    # this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
#    $Self->{'AuthSyncModule::LDAP::AlwaysFilter'} = '';

    # AuthSyncModule::LDAP::UserSyncMap
    # (map if agent should create/synced from LDAP to DB after successful login)
    $Self->{'AuthSyncModule::LDAP::UserSyncMap1'} = {
       # DB -> LDAP
       UserFirstname => 'givenName',
       UserLastname  => 'sn',
       UserEmail     => 'mail',
   };

    # In case you need to use OTRS in iso-charset, you can define this
    # by using this option (converts utf-8 data from LDAP to iso).
#    $Self->{'AuthSyncModule::LDAP::Charset'} = 'iso-8859-1';

    # Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
   $Self->{'AuthSyncModule::LDAP::Params1'} = {
       port    => 389,
       timeout => 120,
       async   => 0,
       version => 3,
   };
   
   
    # Die if backend can't work, e. g. can't connect to server.
#    $Self->{'AuthSyncModule::LDAP::Die'} = 1;
# ----------------------------------------------------   #
# OTRS Active Directory Integration Backed DB Customers  #
# ----------------------------------------------------   #
# This is an example configuration for an LDAP auth. backend.
# (make sure Net::LDAP is installed!)
$Self->{'Customer::AuthModule1'} = 'Kernel::System::CustomerAuth::LDAP';
$Self->{'Customer::AuthModule::LDAP::Host1'} = 'localhost';
$Self->{'Customer::AuthModule::LDAP::BaseDN1'} = 'dc=XXXXXXX,dc=net';
$Self->{'Customer::AuthModule::LDAP::UID1'} = 'sAMAccountName';



#$Self->{'Customer::AuthModule::LDAP::AccessAttr1'} = 'member';



# Check if the user is allowed to auth in a posixGroup
# (e. g. user needs to be in a group xyz to use otrs)
#$Self->{'Customer::AuthModule::LDAP::GroupDN1'} = 'cn=OTRSSEARCH,ou=users,dc=XXXXXXX,dc=net';
#$Self->{'Customer::AuthModule::LDAP::AccessAttr1'} = 'memberUid';
# for ldap posixGroups objectclass (just uid)
#$Self->{'Customer::AuthModule::LDAP::UserAttr1'} = 'UID';
# for non ldap posixGroups objectclass (full user dn)
#$Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN';

# The following is valid but would only be necessary if the
# anonymous user does NOT have permission to read from the LDAP tree
$Self->{'Customer::AuthModule::LDAP::SearchUserDN1'} = 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net';
$Self->{'Customer::AuthModule::LDAP::SearchUserPw1'} = 'Qwer1234';

# in case you want to add always one filter to each ldap query, use
# this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
#$Self->{'Customer::AuthModule::LDAP::AlwaysFilter1'} = '(mail=*)';

# in case you want to add a suffix to each customer login name, then
# you can use this option. e. g. user just want to use user but
# in your ldap directory exists user@domain.
#$Self->{'Customer::AuthModule::LDAP::UserSuffix'} = '@domain.com';

# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'Customer::AuthModule::LDAP::Params1'} = {
    port => 389,
    timeout => 120,
    async => 0,
    version => 3,
};
    $Self->{'CustomerUser1'} = {
        Name => 'SGL Users',
        Module => 'Kernel::System::CustomerUser::LDAP',
        Params => {
            Host => 'torsvdct02.XXXXXXX.net',
            BaseDN => 'dc=XXXXXXX,dc=net',
            SSCOPE => 'sub',
            UserDN => 'CN=OTRS SEARCH,CN=Users,DC=XXXXXXX,DC=net',
            UserPw => 'Qwer1234',
            AlwaysFilter => '',
            Params => {
                port => 389,
                timeout => 120,
                async => 0,
                version => 3,
            },
        },
        CustomerKey => 'sAMAccountName',
        CustomerID => 'mail',
        CustomerUserListFields => ['cn', 'mail'],
        CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
        CustomerUserSearchListLimit => 250,
        CustomerUserPostMasterSearchFields => ['mail'],
        CustomerUserNameFields => ['givenname', 'sn'],
        CustomerUserExcludePrimaryCustomerID => 0,
        AdminSetPreferences => 0,
        Map => [
           [ 'UserSalutation', 'Title',      'title',           1, 0, 'var', '', 0 ],
            [ 'UserFirstname',  'Firstname',  'givenname',       1, 1, 'var', '', 0 ],
            [ 'UserLastname',   'Lastname',   'sn',              1, 1, 'var', '', 0 ],
            [ 'UserLogin',      'Username',   'sAMAccountName',             1, 1, 'var', '', 0 ],
            [ 'UserEmail',      'Email',      'mail',            1, 1, 'var', '', 0 ],
            [ 'UserCustomerID', 'CustomerID', 'mail',            0, 1, 'var', '', 0 ],
            [ 'UserPhone',      'Phone',      'telephonenumber', 1, 0, 'var', '', 0 ],
            [ 'UserAddress',    'Address',    'postaladdress',   1, 0, 'var', '', 0 ],
            [ 'UserComment',    'Comment',    'description',     1, 0, 'var', '', 0 ],
        ],
    };  
    # Die if backend can't work, e. g. can't connect to server.
#    $Self->{'AuthModule::LDAP::Die'} = 1;
    # ---------------------------------------------------- #
    # ---------------------------------------------------- #
    #                                                      #
    # end of your own config options!!!                    #
    #                                                      #
    # ---------------------------------------------------- #
    # ---------------------------------------------------- #
}

# ---------------------------------------------------- #
# needed system stuff (don't edit this)                #
# ---------------------------------------------------- #
use strict;
use warnings;

use vars qw(@ISA);

use Kernel::Config::Defaults;
push (@ISA, 'Kernel::Config::Defaults');

# -----------------------------------------------------#

1;
Which included:
undefeated wrote:   $Self->{'AuthSyncModule1'} = 'Kernel::System::Auth::Sync::LDAP';
undefeated wrote:   $Self->{'AuthModule::UseSyncBackend1'} = 'AuthSyncBackend';
Which accounts for
crythias wrote:I'm missing ...
AuthSyncModule
and $Self->{'AuthModule::UseSyncBackend1'} = 'AuthSyncBackend';
And we're back to the question: What problem are we trying to solve?
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Guru Crythias,

sorry for the confusion,

i have a security group called OTRS-Agents, when i put the user into that group

'cn=OTRS-Agents,ou=Security Groups,ou=Users,ou=People,dc=xxxxxxx,dc=net'

1. i want the user to show up in the picture below, so that i can click him/her and turn him/her into agent.
2. should they go to customer.pl or index.pl to login in order to show up in "AGENT" page?
You do not have the required permissions to view the files attached to this post.
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

undefeated wrote:1. i want the user to show up in the picture below, so that i can click him/her and turn him/her into agent.
2. should they go to customer.pl or index.pl to login in order to show up in "AGENT" page?
From what I understand, the sync will happen when the agent attempts to log in to index.pl, but will only be a member of the groups referenced by:
$Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups'} = [
'users',
];
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Crythias,

everything is in order now, but i have another issue...

i can login, but when create ticket and submit this is what i get. ideas?
You do not have the required permissions to view the files attached to this post.
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

Internal server error will show up in your apache error logs and/or otrs.log which would tend to indicate a misconfiguration/syntax error somewhere.
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

here are the 2 log file. thanks for the help. you are awesome
You do not have the required permissions to view the files attached to this post.
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

Couldn't send mail: 550 5.7.1 Client does not have permissions to send as this sender

Exchange is blocking sending.


>> Bad hostname 'domain.net' (DNS?)

Search failed! base='cn=OTRSSEARCH,ou=users,dc=domain,dc=net', filter='(memberUid=username)', 0000208D: NameErr: DSID-0310020A, problem 2001 (NO_OBJECT), data 0, best match of:

username may not have existed within scope.
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
undefeated
Znuny newbie
Posts: 13
Joined: 31 Oct 2013, 05:33
Znuny Version: 3.2.11
Real Name: Damien Fooo
Company: SGL

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by undefeated »

Hi Crythias

it is almost ready for production... :)
few more thing to change

1. now when i type http://its.XXXXX.com it will bring me to http://its.XXXXX.com/otrs/index.pl, how do i change it to http://its.XXXXX.com/otrs/customer.pl?
2. how to make http://its.XXXXX.com/agent go to http://its.XXXXX.com/otrs/index.pl?


thanks
crythias
Moderator
Posts: 10170
Joined: 04 May 2010, 18:38
Znuny Version: 5.0.x
Location: SouthWest Florida, USA
Contact:

Re: I have no hair to pull, OTRS 3.2.11 on windows 2008R2

Post by crythias »

undefeated wrote: now when i type http://its.XXXXX.com it will bring me to http://its.XXXXX.com/otrs/index.pl, how do i change it to http://its.XXXXX.com/otrs/customer.pl?
Can't really tell you. might be a redirect/index.php/index.html in the root of your apache host. Might be a redirect in your apache configs.
You might consider searching
OTRS 6.0.x (private/testing/public) on Linux with MySQL database.
Please edit your signature to include your OTRS version, Operating System, and database type.
Click Subscribe Topic below to get notifications. Consider amending your topic title to include [SOLVED] if it is so.
Need help? Before you ask
Locked