OTRS Active directory Intigration through LDAP

Moderator: crythias

Locked
ssrinivasu
Znuny newbie
Posts: 2
Joined: 30 Jul 2015, 00:02
Znuny Version: otrs4
Real Name: Srinivasu
Company: sageit

OTRS Active directory Intigration through LDAP

Post by ssrinivasu »

Dear Sir,

i am not able to integrate Active directory 2012 r2 to OTRS 4, I have tried so many ways still i cant, can you please help me how to resolve this problem and also read the documentation but still i am not able to integrate AD.

sometimes i am getting error 'panic no user data db'.

Can you please help on this...

Here is my config file details...

Code: Select all

#Enable LDAP authentication for Customers / Users
  $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
  $Self->{'Customer::AuthModule::LDAP::Host'} = 'ad.ssv.in';
  $Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'DC=ad,DC=ssv,DC=in';
  $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';

#The following is valid but would only be necessary if the
#anonymous user do NOT have permission to read from the LDAP tree
  $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'otrsldap';
  $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = '12345';

#CustomerUser
#(customer user database backend and settings)
    $Self->{CustomerUser} = {
      Module => 'Kernel::System::CustomerUser::LDAP',
      Params => {
      Host => 'ad.ssv.in',
      BaseDN => 'DC=ad,DC=,DC=in',
      SSCOPE => 'sub',
      UserDN =>'otrsldap',
      UserPw => '12345',
    },
# customer unique id
    CustomerKey => 'sAMAccountName',
    # customer #
    CustomerID => 'mail',
    CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
    CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
    CustomerUserSearchPrefix => '',
    CustomerUserSearchSuffix => '*',
    CustomerUserSearchListLimit => 250,
    CustomerUserPostMasterSearchFields => ['mail'],
    CustomerUserNameFields => ['givenname', 'sn'],
    Map => [
      # note: Login, Email and CustomerID needed!
      # var, frontend, storage, shown, required, storage-type
      #[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
      [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
      [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
      [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
      [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
      [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
      [ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
      #[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
      #[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
    ],
  };
  
#Add the following lines when only users are allowed to login if they reside in the spicified security group
#Remove these lines if you want to provide login to all users specified in the User Base DN
#example: $Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'CN=otrs ldap,CN=Users,DC=ad,DC=ssv,DC=in';
  $Self->{'Customer::AuthModule::LDAP::GroupDN'} = 'CN=otrs_allow_C,CN=Users,DC=ad,DC=ssv,DC=in';
  $Self->{'Customer::AuthModule::LDAP::AccessAttr'} = 'member';
  $Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN'
  
#Enable LDAP authentication for Customers / Users
  $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';
  $Self->{'AuthModule::LDAP::Host'} = 'ad.ssv.in';
  $Self->{'AuthModule::LDAP::BaseDN'} = 'DC=ad,DC=ssv,DC=in';
  $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
  
#The following is valid but would only be necessary if the
#anonymous user do NOT have permission to read from the LDAP tree
  $Self->{'AuthModule::LDAP::SearchUserDN'} = 'otrsldap';
  $Self->{'AuthModule::LDAP::SearchUserPw'} = '12345';

# UserSyncLDAPMap
# (map if agent should create/synced from LDAP to DB after login)
    $Self->{UserSyncLDAPMap} = {
        # DB -> LDAP
        UserFirstname => 'otrsldap',
        UserLastname => 'sn',
        UserEmail => 'otrsldap@ssv.in',
    };

# UserSyncLDAPGroups
# (If "LDAP" was selected for AuthModule, you can specify
# initial user groups for first login.)
    $Self->{UserSyncLDAPGroups} = [
        'users',
    ];

# UserTable
    $Self->{DatabaseUserTable} = 'users';
    $Self->{DatabaseUserTableUserID} = 'id';
    $Self->{DatabaseUserTableUserPW} = 'pw';
    $Self->{DatabaseUserTableUser} = 'login';

#Add the following lines when only users are allowed to login if they reside in the spicified security group
#Remove these lines if you want to provide login to all users specified in the User Base DN
  $Self->{'AuthModule::LDAP::GroupDN'} =''CN=otrs_allow_A,CN=Users,DC=ad,DC=ssv,DC=in';
  $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
  $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
Thanks in Advance...

S Srinivasu
Last edited by crythias on 30 Jul 2015, 16:14, edited 1 time in total.
Reason: [code] tags for sanity.
Locked