Configure Optional¶
Everything is pretty well documented in the /ldap/config.php file however here is a more inclusive documentation
For all the examples below we will be using mysite.com as the AD prefix and DC=mysite,DC=com as the base DN
$user_groups = array();
This is not required for a user to login
A valid AD user groups (see KAYAKO_LDAP_ERROR_USERGROUP as well) to user group- AD_Group => Kayako_User_Group
- Can do more than one
Example:¶
Lets say you have a AD group called Customer Service and a Kayako user group called Service:
$user_group_bypass = array();
This is not required for a user to login
This allows the ability to bypass the default Kayako user groups, which is Registered.- AD_Username => User_Group
- Can do more than one
- AD Username must be lowercase (this ensures the validation)
- This bypasses the user_group completely
Example:¶
$user_group_bypass = array('jdoe' => 'Service');
More than one:$user_group_bypass = array('jdoe' => 'Service', 'janedoe' => 'Service', 'fdoe' => 'Technical');
$valid_user_groups = array();
This is not required for a user to login
A AD groups a user must be in to login- If they are not in one of these groups they will not be able to login
- Can do more than one
Example:¶
$valid_user_groups = array('Customer Service', 'IS');
define('KAYAKO_LDAP_VERIFY_CONTROLLER', true);
This is only used if more than one domain controller is used for authentication.
- true - adLDAP will attempt to verify it can connect to one of the controllers. If failed it will try another until one is found or all have been tried
- false - The default behavior is used where adLDAP will to try to connect to one random controller in the list. If failed it will NOT try another server.
define('KAYAKO_LDAP_ERROR_USERGROUP', true);
- true - User will receive an error if they are not in any of the user groups
- false - Users not in the $user_group can still login they just will not be in a User Group
define('KAYAKO_LDAP_TEST', false);
- true - Test mode enabled
- false - Test mode disabled
- username and password is ignored
define('KAYAKO_LDAP_SHOW_ERRORS', false);
- true - Show errors and/or warnings on the screen. Please note that this will cause login to fail if there is even one displayed. Thus this should only be used for testing
- false - Hides them
define('KAYAKO_LDAP_LOG', false);
- true - Logging enabled
- false - Logging disabled
- The /ldap/log directory must be writable (755 or 777)
- You should leave this disabled unless needed as it does extensive logging
define('KAYAKO_LDAP_LOG_XML', false);
- true - Log the XML output
- false - Disabled
define('KAYAKO_LDAP_LOG_OUTPUT', false);
- true - Attempts to log everything displayed to the screen
- false - Disabled
- Note the KAYAKO_LDAP_LOG_XML is redundant if this is enabled
define('KAYAKO_LDAP_USERNAME', 'username');
A valid AD username to test with
define('KAYAKO_LDAP_PASSWORD', 'password');
The password to go with KAYAKO_LDAP_USERNAME
define('KAYAKO_LDAP_PHONE_NUMBER', true);
- true - The AD mobile or home number will be used if the AD telephone number is empty
- false - Disabled
define('KAYAKO_LDAP_IMPORT_DEPARTMENT', true);
- true - Import AD Department to Organization in the user's profile
- false - Disabled
define('KAYAKO_LDAP_IMPORT_TITLE', true);
- true - Import AD Job Title to Title/Position in the user's profile
- false - Disabled
$use_adldap_options = false;
This enables all the options listed below
- true - Use the adLdap options
- false - Disabled
$admin_user_name = ''; $admin_password = '';
An account with higher privileges to perform privileged operations.
Example:¶
$admin_user_name = 'CIO'; $admin_password = 'MyPa$$w0rd';
$use_ssl = false;
- true - Use SSL to connect to AD
- false - Disabled
$use_tls = false;
- true - Use TLS to connect to AD
- false - Disabled
$ad_port = 389;
Change to use a port other than the standard. It must be numeric