$info=$fgroup->_load_ldap_info(); $dn=$fgroup->_load_ldap_dn($info); $result=$ldap->add($dn,$info,$user); // Wil fail if already exists $result=$ldap->update($dn,$info,$user,$olddn); if ($result > 0) { print " - ".$langs->trans("OK"); } else { $error++; print " - ".$langs->trans("KO").' - '.$ldap->error; } print "\n"; $i++; } $ldap->unbind(); $ldap->close(); } else { dol_print_error($db); } return $error; ?>
/** * Check validity of user/password/entity * If test is ko, reason must be filled into $_SESSION["dol_loginmesg"] * * @param string $usertotest Login * @param string $passwordtotest Password * @param int $entitytotest Number of instance (always 1 if module multicompany not enabled) * @return string Login if OK, '' if KO */ function check_user_password_ldap($usertotest, $passwordtotest, $entitytotest) { global $db, $conf, $langs; global $_POST; global $dolibarr_main_auth_ldap_host, $dolibarr_main_auth_ldap_port; global $dolibarr_main_auth_ldap_version, $dolibarr_main_auth_ldap_servertype; global $dolibarr_main_auth_ldap_login_attribute, $dolibarr_main_auth_ldap_dn; global $dolibarr_main_auth_ldap_admin_login, $dolibarr_main_auth_ldap_admin_pass; global $dolibarr_main_auth_ldap_filter; global $dolibarr_main_auth_ldap_debug; // Force master entity in transversal mode $entity = $entitytotest; if (!empty($conf->multicompany->enabled) && !empty($conf->multicompany->transverse_mode)) { $entity = 1; } $login = ''; $resultFetchUser = ''; if (!function_exists("ldap_connect")) { dol_syslog("functions_ldap::check_user_password_ldap Authentification ko failed to connect to LDAP. LDAP functions are disabled on this PHP"); sleep(1); $langs->load('main'); $langs->load('other'); $_SESSION["dol_loginmesg"] = $langs->trans("ErrorLDAPFunctionsAreDisabledOnThisPHP") . ' ' . $langs->trans("TryAnotherConnectionMode"); return; } if ($usertotest) { dol_syslog("functions_ldap::check_user_password_ldap usertotest=" . $usertotest . " passwordtotest=" . preg_replace('/./', '*', $passwordtotest) . " entitytotest=" . $entitytotest); // If test username/password asked, we define $test=false and $login var if ok, set $_SESSION["dol_loginmesg"] if ko $ldaphost = $dolibarr_main_auth_ldap_host; $ldapport = $dolibarr_main_auth_ldap_port; $ldapversion = $dolibarr_main_auth_ldap_version; $ldapservertype = empty($dolibarr_main_auth_ldap_servertype) ? 'openldap' : $dolibarr_main_auth_ldap_servertype; $ldapuserattr = $dolibarr_main_auth_ldap_login_attribute; $ldapdn = $dolibarr_main_auth_ldap_dn; $ldapadminlogin = $dolibarr_main_auth_ldap_admin_login; $ldapadminpass = $dolibarr_main_auth_ldap_admin_pass; $ldapdebug = empty($dolibarr_main_auth_ldap_debug) || $dolibarr_main_auth_ldap_debug == "false" ? false : true; if ($ldapdebug) { print "DEBUG: Logging LDAP steps<br>\n"; } require_once DOL_DOCUMENT_ROOT . '/core/class/ldap.class.php'; $ldap = new Ldap(); $ldap->server = explode(',', $ldaphost); $ldap->serverPort = $ldapport; $ldap->ldapProtocolVersion = $ldapversion; $ldap->serverType = $ldapservertype; $ldap->searchUser = $ldapadminlogin; $ldap->searchPassword = $ldapadminpass; if ($ldapdebug) { dol_syslog("functions_ldap::check_user_password_ldap Server:" . join(',', $ldap->server) . ", Port:" . $ldap->serverPort . ", Protocol:" . $ldap->ldapProtocolVersion . ", Type:" . $ldap->serverType); dol_syslog("functions_ldap::check_user_password_ldap uid/samacountname=" . $ldapuserattr . ", dn=" . $ldapdn . ", Admin:" . $ldap->searchUser . ", Pass:"******"DEBUG: Server:" . join(',', $ldap->server) . ", Port:" . $ldap->serverPort . ", Protocol:" . $ldap->ldapProtocolVersion . ", Type:" . $ldap->serverType . "<br>\n"; print "DEBUG: uid/samacountname=" . $ldapuserattr . ", dn=" . $ldapdn . ", Admin:" . $ldap->searchUser . ", Pass:"******"<br>\n"; } $resultFetchLdapUser = 0; // Define $userSearchFilter $userSearchFilter = ""; if (empty($dolibarr_main_auth_ldap_filter)) { $userSearchFilter = "(" . $ldapuserattr . "=" . $usertotest . ")"; } else { $userSearchFilter = str_replace('%1%', $usertotest, $dolibarr_main_auth_ldap_filter); } // If admin login provided // Code to get user in LDAP from an admin connection (may differ from user connection, done later) if ($ldapadminlogin) { $result = $ldap->connect_bind(); if ($result > 0) { $resultFetchLdapUser = $ldap->fetch($usertotest, $userSearchFilter); //dol_syslog('functions_ldap::check_user_password_ldap resultFetchLdapUser='******'functions_ldap::check_user_password_ldap ' . $usertotest . ' must change password next logon'); if ($ldapdebug) { print "DEBUG: User " . $usertotest . " must change password<br>\n"; } $ldap->close(); sleep(1); $langs->load('ldap'); $_SESSION["dol_loginmesg"] = $langs->trans("YouMustChangePassNextLogon", $usertotest, $ldap->domainFQDN); return ''; } } else { if ($ldapdebug) { print "DEBUG: " . $ldap->error . "<br>\n"; } } $ldap->close(); } // Forge LDAP user and password to test with them // If LDAP need a dn with login like "uid=jbloggs,ou=People,dc=foo,dc=com", default dn may work even if previous code with // admin login no exectued. $ldap->searchUser = $ldapuserattr . "=" . $usertotest . "," . $ldapdn; // Default dn (will work if LDAP accept a dn with login value inside) // But if LDAP need a dn with name like "cn=Jhon Bloggs,ou=People,dc=foo,dc=com", previous part must have been executed to have // dn detected into ldapUserDN. if ($resultFetchLdapUser and !empty($ldap->ldapUserDN)) { $ldap->searchUser = $ldap->ldapUserDN; } $ldap->searchPassword = $passwordtotest; // Test with this->seachUser and this->searchPassword //print $resultFetchLdapUser."-".$ldap->ldapUserDN."-".$ldap->searchUser.'-'.$ldap->searchPassword;exit; $result = $ldap->connect_bind(); if ($result > 0) { if ($result == 2) { dol_syslog("functions_ldap::check_user_password_ldap Authentification ok"); $login = $usertotest; // ldap2dolibarr synchronisation if ($login && !empty($conf->ldap->enabled) && $conf->global->LDAP_SYNCHRO_ACTIVE == 'ldap2dolibarr') { dol_syslog("functions_ldap::check_user_password_ldap Sync ldap2dolibarr"); // On charge les attributs du user ldap if ($ldapdebug) { print "DEBUG: login ldap = " . $login . "<br>\n"; } $resultFetchLdapUser = $ldap->fetch($login, $userSearchFilter); if ($ldapdebug) { print "DEBUG: UACF = " . join(',', $ldap->uacf) . "<br>\n"; } if ($ldapdebug) { print "DEBUG: pwdLastSet = " . dol_print_date($ldap->pwdlastset, 'day') . "<br>\n"; } if ($ldapdebug) { print "DEBUG: badPasswordTime = " . dol_print_date($ldap->badpwdtime, 'day') . "<br>\n"; } // On recherche le user dolibarr en fonction de son SID ldap $sid = $ldap->getObjectSid($login); if ($ldapdebug) { print "DEBUG: sid = " . $sid . "<br>\n"; } $usertmp = new User($db); $resultFetchUser = $usertmp->fetch('', $login, $sid); if ($resultFetchUser > 0) { dol_syslog("functions_ldap::check_user_password_ldap Sync user found user id=" . $usertmp->id); // On verifie si le login a change et on met a jour les attributs dolibarr if ($usertmp->login != $ldap->login && $ldap->login) { $usertmp->login = $ldap->login; $usertmp->update($usertmp); // TODO Que faire si update echoue car on update avec un login deja existant. } //$resultUpdate = $usertmp->update_ldap2dolibarr($ldap); } unset($usertmp); } if (!empty($conf->multicompany->enabled)) { global $mc; $usertmp = new User($db); $usertmp->fetch('', $login); $ret = $mc->checkRight($usertmp->id, $entitytotest); if ($ret < 0) { dol_syslog("functions_ldap::check_user_password_ldap Authentification ko entity '" . $entitytotest . "' not allowed for user '" . $usertmp->id . "'"); $login = ''; // force authentication failure } unset($usertmp); } } if ($result == 1) { dol_syslog("functions_ldap::check_user_password_ldap Authentification ko bad user/password for '" . $usertotest . "'"); sleep(1); $langs->load('main'); $langs->load('other'); $_SESSION["dol_loginmesg"] = $langs->trans("ErrorBadLoginPassword"); } } else { /* Login failed. Return false, together with the error code and text from ** the LDAP server. The common error codes and reasons are listed below : ** (for iPlanet, other servers may differ) ** 19 - Account locked out (too many invalid login attempts) ** 32 - User does not exist ** 49 - Wrong password ** 53 - Account inactive (manually locked out by administrator) */ dol_syslog("functions_ldap::check_user_password_ldap Authentification ko failed to connect to LDAP for '" . $usertotest . "'"); if (is_resource($ldap->connection)) { $ldap->ldapErrorCode = ldap_errno($ldap->connection); $ldap->ldapErrorText = ldap_error($ldap->connection); dol_syslog("functions_ldap::check_user_password_ldap " . $ldap->ldapErrorCode . " " . $ldap->ldapErrorText); } sleep(1); $langs->load('main'); $langs->load('other'); $langs->load('errors'); $_SESSION["dol_loginmesg"] = $ldap->error ? $ldap->error : $langs->trans("ErrorBadLoginPassword"); } $ldap->close(); } return $login; }
$auth->setLdapBindType($ldap_bind_type); $auth->setLdapBindScope($ldap_bind_scope); $auth->setLdapPassword($ldap_password); $auth->setLdapUsername($ldap_username); $auth->setLdapPort($ldap_port); $auth->setLdapServer($ldap_server); $auth->setLdapSslVerify($ldap_ssl_verify); $auth->setLdapStartTls($ldap_start_tls); $auth->setLdapUserPattern($ldap_user_pattern); try { $username = $auth->getLdapUserAttribute(); $info = $auth->listAllUsers(array($auth->getLdapUserAttribute(), $ldap_account_full_name, $ldap_account_email), 0); if (is_array($info)) { for ($i = 0; $i < $info['count']; $i++) { $user = @$info[$i][$username][0]; echo '<tr>'; echo '<td><input type="checkbox" name="ldapAdminUser[]" value="' . $user . '" /></td>'; echo '<td>' . $user . '</td>'; echo '<td>' . @$info[$i][$ldap_account_full_name][0] . '</td>'; echo '<td>' . @$info[$i][$ldap_account_email][0] . '</td>'; echo '</tr>'; } } } catch (Exception $e) { error_log($e->getMessage()); echo '<tr>'; echo '<td colspan="4">' . $e->getMessage() . '</td>'; echo '</tr>'; } $auth->close();
$chewbaccaDN = Ldap::add($connection, 'chewbacca', '{MD5}' . base64_encode(pack('H*', md5('aaawwwwrrrkk'))), "ou=StarWars,{$dc}", 'Chewbacca', 'Chewbacca', array('givenName' => 'Chewbacca', 'displayName' => 'Chewbacca the Wokiee', 'ou' => array('StarWars', 'Rogues', 'RebelAlliance'), 'mail' => array('*****@*****.**'))); $hanSoloDN = Ldap::add($connection, 'han.solo', '{MD5}' . base64_encode(pack('H*', md5('leiaishot'))), "ou=StarWars,{$dc}", 'Solo', 'Han Solo', array('givenName' => 'Han', 'displayName' => 'He who shot first', 'ou' => array('StarWars', 'Rogues', 'RebelAlliance'), 'mail' => array('*****@*****.**'))); $princessLeiaDN = Ldap::add($connection, 'leia', '{MD5}' . base64_encode(pack('H*', md5('bunhead'))), "ou=StarWars,{$dc}", 'Organa', 'Leia Organa', array('givenName' => 'Leia', 'displayName' => 'Princess Leia', 'ou' => array('StarWars', 'RebelAlliance'), 'mail' => array('*****@*****.**'))); $darthVaderDN = Ldap::add($connection, 'darth.vader', '{MD5}' . base64_encode(pack('H*', md5('whosyourdaddy'))), "ou=StarWars,{$dc}", 'Skywalker', 'Anakin Skywalker', array('givenName' => 'Anakin', 'displayName' => 'Darth Vader', 'ou' => array('StarWars', 'GalacticEmpire', 'Sith'), 'mail' => array('*****@*****.**'))); $jabbaTheHuttDN = Ldap::add($connection, 'jabba.thehutt', '{MD5}' . base64_encode(pack('H*', md5('wishihadlegs'))), "ou=StarWars,{$dc}", 'Hutt', 'Jabba Hutt', array('givenName' => 'Jabba', 'displayName' => 'Jabba the Hutt', 'ou' => array('Hutts'), 'mail' => array('*****@*****.**'))); $obiWanDN = Ldap::add($connection, 'obi.wan', '{MD5}' . base64_encode(pack('H*', md5('thesearenotthedroids'))), "ou=StarWars,{$dc}", 'Kenobi', 'Obi Wan Kenobi', array('givenName' => 'Obi Wan', 'displayName' => 'Obi Wan Kenobi', 'ou' => array('StarWars', 'RebelAlliance', 'Jedi'), 'seeAlso' => array("ou=StarWars,{$dc}", "ou=RebelAlliance,ou=StarWars,{$dc}", "ou=Jedi,ou=RebelAlliance,ou=StarWars,{$dc}"), 'mail' => array('*****@*****.**'))); $bobaFettDN = Ldap::add($connection, 'boba.fett', '{MD5}' . base64_encode(pack('H*', md5('ihatesarlacs'))), "ou=StarWars,{$dc}", 'Fett', 'Boba Fett', array('givenName' => 'Boba', 'displayName' => 'Boba Fett', 'ou' => array('StarWars', 'Rogues'), 'seeAlso' => array("ou=StarWars,{$dc}", "ou=Rogues,ou=StarWars,{$dc}"), 'mail' => array('*****@*****.**'))); $yodaDN = Ldap::add($connection, 'yoda', '{MD5}' . base64_encode(pack('H*', md5('dagobah4eva'))), "ou=StarWars,{$dc}", 'Yoda', 'Yoda', array('givenName' => 'Yoda', 'displayName' => 'Yoda', 'ou' => array('StarWars', 'RebelAlliance', 'Jedi'), 'seeAlso' => array("ou=StarWars,{$dc}", "ou=RebelAlliance,ou=StarWars,{$dc}", "ou=Jedi,ou=RebelAlliance,ou=StarWars,{$dc}"), 'mail' => array('*****@*****.**'))); Ldap::addGroup($connection, 'RebelAlliance', "ou=StarWars,{$dc}", array('seeAlso' => array($princessLeiaDN, $chewbaccaDN, $hanSoloDN, $obiWanDN, $yodaDN))); Ldap::addGroup($connection, 'Rogues', "ou=StarWars,{$dc}", array('seeAlso' => array($chewbaccaDN, $hanSoloDN))); Ldap::addGroup($connection, 'GalacticEmpire', "ou=StarWars,{$dc}", array('seeAlso' => array($darthVaderDN))); Ldap::addGroup($connection, 'Sith', "ou=GalacticEmpire,ou=StarWars,{$dc}", array('seeAlso' => array($darthVaderDN))); Ldap::addGroup($connection, 'Jedi', "ou=RebelAlliance,ou=StarWars,{$dc}", array('seeAlso' => array($obiWanDN, $yodaDN))); // This dumps all the LDAP data // Ldap::fetchAll( $connection, $dc ); Ldap::close($connection); /** * Support for LDAP functions connect, add, delete and get_entries. */ class Ldap { /** * Connects to an LDAP server specified by $uri, with admin $user and $password. * * Returns a resource which can be used in LDAP functions like add, delete, search. * * @param string $uri Uri for LDAP, such as 'ldap://example.com' * @param string $format Format for an entry, like 'cn=%s,dc=example,dc=com'. %s is a literal placeholder for username * @param string $user Admin username * @param string $password Password for admin * @return resource