background preloader

LDAP Server

Facebook Twitter

LDAP. The Lightweight Directory Access Protocol (LDAP; /ˈɛldæp/) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.[1] Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.[2] As examples, directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory.

Similarly, a telephone directory is a list of subscribers with an address and a phone number. LDAP is specified in a series of Internet Engineering Task Force (IETF) Standard Track publications called Request for Comments (RFCs), using the description language ASN.1. The latest specification is Version 3, published as RFC 4511. History[edit] Protocol overview[edit] Directory structure[edit] To set up a LDAP server and its clients. LDAP (Lightweight Directory Access Protocol) allows central user, group, domain..... authentication, information storage ... Using LDAP in a local network, you can allow your users to login and authenticate from anywhere on your network.

This tutorial will be split in 2 parts. In the first part, I will explain how-to install, configure the LDAP server, add a few users and group, in the second part, we will set up Linux client to authenticate through LDAP if the user does not exist on the local filesystem. In this tutorial, I will suppose that our LDAP server is located at 192.168.1.4. All machines in the network can resolve the host name ldap to 192.168.1.4. The LDAP server is going to manage domain debuntu.local.

The server runs Debian 4 (testing but almost stable) and the client Ubuntu Feisty 7.04. 1.1. In order to get our LDAP server setted up, we need a couple of packages to be installed: # apt-get install slapd ldap-utils migrationtools #dpkg-reconfigure slapd # /etc/init.d/slapd start. Multisite with SSO to Moodle | groups.drupal.org. LDAP authentication. Location: Settings link in Settings > Site administration > Plugins > Authentication > Manage authentication This document describes how to set up Lightweight Directory Access Protocol (LDAP) authentication in Moodle.

We cover the basic, advanced and some trouble shooting sections to assist the user in the installation and administrating LDAP in Moodle. Table of Contents Basic Scenario The simple and straightforward approach for most installations. Assumptions Your Moodle site is located at You have configured your PHP installation with the LDAP extension. Table of Contents Configuring Moodle authentication Log in as an admin user and go to Administration > Plugins > Authentication > Manage authentication.

Now, you just have to fill in the values. LDAP Server Settings Bind settings User lookup settings Force change password LDAP password expiration settings Enable user creation Course creation Cron synchronization script Data Mapping Active Directory help Linux servers c_rehash. LDAP integration.