Redmine integration ldap user_php tutorial

Source: Internet
Author: User
Tags crypt openldap redmine
Redmine integrates ldap users. To integrate ldap with redmine, you must first configure LDAP. Otherwise, you will find the installation process of your exhausted LDAP in the blog directory () corresponding to slapd. to write the conf configuration file, we need three copies of redmine to integrate ldap users.
Configure LDAP first, or you will be exhausted.


Find the LDAP installation process in the blog directory ()


Write the corresponding slapd. conf configuration file


We need three data files.
The first part is the basic template directory file.
Vim base. ldif
------------------------------------------
Dn: dc = bb, dc = com
Objectclass: dcObject
Objectclass: organization
O: Cywx, Inc.
Dc: bb


Dn: cn = Ma, dc = bb, dc = com
Objectclass: organizationalRole
Cn: Ma


Dn: ou = People, cn = Ma, dc = bb, dc = com
Ou: People
Objectclass: top
Objectclass: organizationalUnit


Dn: ou = Group, cn = Ma, dc = bb, dc = com
Ou: Group
Objectclass: top
Objectclass: organizationalUnit


----------------------------------------------------------


The second part is a group of files.
Vim group. ldif
-------------------------------
Dn: cn = t1, ou = Group, cn = Ma, dc = bb, dc = com
ObjectClass: posixGroup
ObjectClass: top
Cn: t1
UserPassword: {crypt} x
GidNumber: 501


Dn: cn = t2, ou = Group, cn = Ma, dc = bb, dc = com
ObjectClass: posixGroup
ObjectClass: top
Cn: t2
UserPassword: {crypt} x
GidNumber: 502


Dn: cn = ldapuser1, ou = Group, cn = Ma, dc = bb, dc = com
ObjectClass: posixGroup
ObjectClass: top
Cn: ldapuser1
UserPassword: {crypt} x
GidNumber: 503


Dn: cn = ldapuser2, ou = Group, cn = Ma, dc = bb, dc = com
ObjectClass: posixGroup
ObjectClass: top
Cn: ldapuser2
UserPassword: {crypt} x
GidNumber: 504
-------------------------------------------------------------




The third group is user files.
Vim passwd. ldif
------------------------------------------------------------
Dn: uid = t1, ou = People, cn = Ma, dc = bb, dc = com
Uid: t1
Cn: t1
# ObjectClass: account
ObjectClass: posixAccount
ObjectClass: top
ObjectClass: shadowAccount
ObjectClass: person
ObjectClass: OpenLDAPperson
Surname: t1
GivenName: z
Mail: test1@wifi.tt
UserPassword: {crypt }!!
ShadowLastChange: 16772
ShadowMin: 0
ShadowMax: 99999
ShadowWarning: 7
LoginShell:/bin/bash
UidNumber: 500
GidNumber: 501
HomeDirectory:/home/t1


Dn: uid = t2, ou = People, cn = Ma, dc = bb, dc = com
Uid: t2
Cn: t2
# ObjectClass: account
ObjectClass: posixAccount
ObjectClass: top
ObjectClass: shadowAccount
ObjectClass: person
ObjectClass: OpenLDAPperson
Surname: t2
GivenName: z
Mail: test1@wifi.t
UserPassword: {crypt }!!
ShadowLastChange: 16772
ShadowMin: 0
ShadowMax: 99999
ShadowWarning: 7
LoginShell:/bin/bash
UidNumber: 501
GidNumber: 502
HomeDirectory:/home/t2


Dn: uid = ldapuser1, ou = People, cn = Ma, dc = bb, dc = com
Uid: ldapuser1
Cn: ldapuser1
# ObjectClass: account
ObjectClass: posixAccount
ObjectClass: top
ObjectClass: shadowAccount
ObjectClass: person
ObjectClass: OpenLDAPperson
Surname: ldapuser1
GivenName: z
Mail: test1@wifi.tt
UserPassword: {crypt} $6 $ a3DH5nze $ cipher/gm5uM7OWEbGBwTIqP. qiuwx8vgslm1_0. daLBzmplElH.
ShadowLastChange: 16772
ShadowMin: 0
ShadowMax: 99999
ShadowWarning: 7
LoginShell:/bin/bash
UidNumber: 502
GidNumber: 503
HomeDirectory:/home/ldapuser1


Dn: uid = ldapuser2, ou = People, cn = Ma, dc = bb, dc = com
Uid: ldapuser2
Cn: ldapuser2
# ObjectClass: account
ObjectClass: posixAccount
ObjectClass: top
ObjectClass: shadowAccount
ObjectClass: person
ObjectClass: OpenLDAPperson
Surname: ldapuser2
GivenName: z
Mail: test1@wifi.tt
UserPassword: {crypt} $6 $ An0Hoxly $ ASSETS./szTXFLf. JJAYWZTjYJKiXAtO6cARH. UQeZb1
ShadowLastChange: 16773
ShadowMin: 0
ShadowMax: 99999
ShadowWarning: 7
LoginShell:/bin/bash
UidNumber: 503
GidNumber: 504
HomeDirectory:/home/ldapuser2




Bytes ------------------------------------------------------------------------------------------------------
Then start loading data.
Ldapadd-x-D "cn = Ma, dc = bb, dc = com"-W-f/etc/openldap/base. ldif
Ldapadd-x-D "cn = Ma, dc = bb, dc = com"-W-f/etc/openldap/group. ldif
Ldapadd-x-D "cn = Ma, dc = bb, dc = com"-W-f/etc/openldap/passwd. ldif


After loading is complete, OK
The effect shown on the client is as follows:




This is configured in the redmine background. see the figure below.


Http://www.bkjia.com/PHPjc/1077998.htmlwww.bkjia.comtruehttp://www.bkjia.com/PHPjc/1077998.htmlTechArticleredmine integration ldap users first need to configure LDAP or will put your tired LDAP installation process in the blog directory find () to correspond to slapd. to write the conf configuration file, we need three copies...

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.