<html><head><meta http-equiv="Content-Type" content="text/html charset=utf-8"><meta http-equiv="Content-Type" content="text/html charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">Hi all,<div class=""><span class="Apple-tab-span" style="white-space:pre">      </span>I’m experimenting with setting up Kolab along with an instance of Wordpress to provide both groupware and additional web functionality.  I’m hoping to allow the LDAP user store in Kolab to provide user authentication for the Wordpress stuff.  Am I crazy, or is this a reasonable thing to expect to work?</div><div class=""><br class=""></div><div class="">I’m using a Wordpress plugin called WPDirAuth to make this connection, but I’m a newbie with Kolab and not terribly experienced with LDAP.  Would anyone be willing to review the settings from this plugin shown below and take a first stab at what values might make sense?</div><div class=""><br class=""></div><div class="">The primary (and only) domain under which Kolab was setup is “<a href="http://ev.ithaca.ny.us" class="">ev.ithaca.ny.us</a>”.</div><div class=""><br class=""></div><div class="">Any help will be greatly appreciated.</div><div class=""><br class=""></div><div class=""><li class="">
                            <label for="dirAuthControllers" class=""><strong class="">Directory Servers (Domain Controllers)</strong></label>
                            <br class="">
                            <input name="dirAuthControllers" value="eviweb.ev.ithaca.ny.us:389" size="40" type="text" class=""><br class="">
                            <em class="">The DNS name or IP address of the directory server(s).</em></li><li class="">
                            <strong class="">NOTE:</strong> Separate multiple entries by a comma and/or alternate ports with a colon (eg: <a href="http://my.server1.org" class="">my.server1.org</a>, <a href="http://my.server2.edu" class="">my.server2.edu</a>:387).
                            Unfortunately, alternate ports will be ignored when using LDAP/SSL, because of <a href="http://ca3.php.net/ldap_connect" class="">the way</a> PHP handles the protocol.</li>
                        <li class="">
                            <label for="dirAuthFilter" class=""><strong class="">Account Filter</strong></label>
                            <br class="">
                            <input name="dirAuthFilter" value="samAccountName" size="40" type="text" class="">
                            (Defaults to <em class="">samAccountName</em>) 
                            <br class="">
                            <em class="">What LDAP field should we search the username against to locate the user's profile after successful login?</em>
                        </li>
                        <li class="">
                            <label for="dirAuthAccountSuffix" class=""><strong class="">Account Suffix</strong></label>
                            <br class="">
                            <input name="dirAuthAccountSuffix" value="" size="40" type="text" class=""><br class="">
                            <em class="">Suffix to be automatically appended to the username if desired. e.g. @<a href="http://domain.com" class="">domain.com</a></em><br class="">
                            <strong class="">NOTE:</strong> Changing this value will cause your existing directory users to have new accounts created the next time they login.
                        </li>
                        <li class="">
                            <label for="dirAuthBaseDn" class=""><strong class="">Base DN</strong></label>
                            <br class="">
                            <input name="dirAuthBaseDn" value="ou=People,dc=ev, dc=ithaca, dc=ny, dc=us" size="40" type="text" class=""><br class="">
                            <em class="">The base DN for carrying out LDAP searches.</em>
                        </li>
                        <li class="">
                            <label for="dirAuthPreBindUser" class=""><strong class="">Bind DN</strong></label>
                            <br class="">
                            <input name="dirAuthPreBindUser" value="" size="40" type="text" class=""><br class="">
                            <em class="">Enter a valid user account/DN to 
pre-bind with if your LDAP server does not allow anonymous profile 
searches, or requires a user with specific privileges to search.</em>
                        </li>
                        <li class="">
                            <label for="dirAuthPreBindPassword" class=""><strong class="">Bind Password</strong></label>
                            <br class="">
                            <input name="dirAuthPreBindPassword" value="" size="40" type="password" class=""><br class="">
                            <em class="">Enter a password for the above Bind DN if a value is needed.</em><br class="">
                            <strong class="">Note 1</strong>: this value will be stored in clear text in your WordPress database.<br class="">
                            <strong class="">Note 2</strong>: Simply clear the Bind DN value if you wish to delete the stored password altogether.
                        </li>
                        <li class="">
                            <label for="dirAuthPreBindPassCheck" class=""><strong class="">Confirm Password</strong></label>
                            <br class="">
                            <input name="dirAuthPreBindPassCheck" value="" size="40" type="password" class=""><br class="">
                            <em class="">Confirm the above Bind Password if you are setting a new value.</em>
                        </li>
                        <li class="">
                            <label for="dirAuthGroups" class=""><strong class="">Authentication Groups</strong></label><br class="">
                            <input name="dirAuthGroups" id="dirAuthGroups" size="40" value="" type="text" class=""><br class="">
                            <em class="">Enter each group CN that the user must be a member of in order to authenticate.</em> <br class="">
                            <strong class="">NOTE:</strong> Separate multiple CNs by a comma.
                        </li><div class=""><br class=""></div></div></body></html>