Code: Select all
Starting httpd: httpd: Could not reliably determine the server's fully qualified domain name, using localhost.localdomain for ServerName
[FAILED]
Code: Select all
# This is an example configuration for using an MS AD backend
$Self->{'AuthModule1'} = 'Kernel::System::Auth::LDAP';
#$Self->{'AuthModule::LDAP::Host1'} = 'CHE-SVL-ADS-01.SIVAGROUP.ITL';
$Self->{'AuthModule::LDAP::Host1'} = 'xx.xx.xx.xx';
$self->{'AuthModule::LDAP::BaseDN1'}='CN=CHE-SVL-ADS-01,DC=SIVAGROUP,DC=ITL';
#$Self->{'AuthModule::LDAP::BaseDN1'} = 'CN=Users,dc=shatest,dc=com';
$Self->{'AuthModule::LDAP::UID1'} = 'sAMAccountName';
# Check if the user is allowed to auth in a posixGroup
# (e. g. user needs to be in a group OTRS_Agents to use otrs)
$Self->{'AuthModule::LDAP::GroupDN1'} = 'CN=otrs,OU=SIH,OU=Domestic,DC=SIVAGROUP,DC=ITL';
$Self->{'AuthModule::LDAP::AccessAttr1'} = 'member';
$Self->{'AuthModule::LDAP::UserAttr1'} = 'DN';
# Bind credentials to log into AD
$Self->{'AuthModule::LDAP::SearchUserDN1'} = 'CN=900191,OU=SIH,OU=Domestic,DC=SIVAGROUP,DC=ITL';
$Self->{'AuthModule::LDAP::SearchUserPw1'} = 'xxxxxxxxx';
# in case you want to add always one filter to each ldap query, use
# this option. e. g. AlwaysFilter => '(mail=*)' or AlwaysFilter => '(objectclass=user)'
$Self->{'AuthModule::LDAP::AlwaysFilter1'} = '';
# in case you want to add a suffix to each login name, then
# you can use this option. e. g. user just want to use user but
# in your ldap directory exists user@domain.
#$Self->{'AuthModule::LDAP::UserSuffix'} = '';
# Net::LDAP new params (if needed - for more info see perldoc Net::LDAP)
$Self->{'AuthModule::LDAP::Params1'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
sscope => 'sub'
};
# Now sync data with OTRS DB
$Self->{'AuthSyncModule1'} = 'Kernel::System::Auth::Sync::LDAP';
$Self->{'AuthSyncModule::LDAP::Host1'} = 'xx.xx.xx.xx';
$Self->{'AuthSyncModule::LDAP::BaseDN1'} = 'OU=Domestic,CN=CHE-SVL-ADS-01,DC=SIVAGROUP,DC=ITL';
$Self->{'AuthSyncModule::LDAP::UID1'} = 'sAMAccountName';
$Self->{'AuthSyncModule::LDAP::SearchUserDN1'} = 'CN=900191,OU=SIH,OU=Domestic,DC=SIVAGROUP,DC=ITL';
$Self->{'AuthSyncModule::LDAP::SearchUserPw1'} = 'xxxxxxxx';
$Self->{'AuthSyncModule::LDAP::UserSyncMap1'} = {
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
};
# UserSyncLDAPGroups
# (If "LDAP" was selected for AuthModule, you can specify
# initial user groups for first login.)
#$Self->{UserSyncLDAPGroups} = [
# 'users',
#];
# AuthSyncModule::LDAP::UserSyncInitialGroups
# (sync following group with rw permission after initial create of first agent
# login)
$Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups1'} = [
'customer_user',
];
#-------------------Enable LDAP authentication for Customers / Users------------------
$Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
$Self->{'Customer::AuthModule::LDAP::Host'} = 'xx.xx.xx.xx';
$Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'OU=Domestic,CN=CHE-SVL-ADS-01,DC=SIVAGROUP,DC=ITL';
$Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
#$Self->{'Customer::AuthModule::LDAP::SSCOPE'} = 'sub';
# The following is valid but would only be necessary if the
# anonymous user do NOT have permission to read from the LDAP tree
$Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'CN=900191,OU=SIH,OU=Domestic,DC=SIVAGROUP,DC=ITL';
$Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'xxxxxxxxxx';
# CustomerUser
# (customer user database backend and settings)
$Self->{CustomerUser} = {
Module => 'Kernel::System::CustomerUser::LDAP',
Params => {
#port => 389,
#timeout => 120,
#async => 0,
#version =>3,
Host => 'xx.xx.xx.xx',
BaseDN => 'DC=SIVAGROUP,DC=ITL',
SSCOPE => 'sub',
UserDN =>'CCN=900191,OU=SIH,OU=Domestic,DC=SIVAGROUP,DC=ITL',
#UserDN => ''
UserPw => 'xxxxxxxxxx',
#UserPw => '',
},
# customer unique id
CustomerKey => 'sAMAccountName',
# customer #
CustomerID => 'mail',
CustomerUserListFields => ['cn', 'mail'],
CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchPrefix => '',
CustomerUserSearchSuffix => '*',
CustomerUserSearchListLimit => 250,
CustomerUserPostMasterSearchFields => ['mail'],
CustomerUserNameFields => ['givenname', 'sn'],
Map => [
# note: Login, Email and CustomerID needed!
# var, frontend, storage, shown, required, storage-type
#[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
[ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var','',0 ],
[ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var','',0 ],
[ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var','',0 ],
[ 'UserEmail', 'Email', 'mail', 1, 1, 'var','',0 ],
[ 'UserCustomerID', 'CustomerID', 'sAMAccountName', 0, 1, 'var','',0 ],
[ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var','',0 ],
#[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var','',0 ],
#[ 'UserComment', 'Comment', 'description', 1, 0, 'var','',0 ],
],
};
#Add the following lines when only users are allowed to login if they reside in the spicified security group
#Remove these lines if you want to provide login to all users specified in the User Base DN
$Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'CN=CHE-SVL-ADS-01,dc=SIVAGROUP, dc=ITL';
#$Self->{'Customer::AuthModule::LDAP::GroupDN'} = 'CN=otrs_allow_C,OU=Users,DC=shatest,DC=com';
$Self->{'Customer::AuthModule::LDAP::AccessAttr'} = 'member';
$Self->{'Customer::AuthModule::LDAP::UserAttr'} = 'DN'
Code: Select all
[Tue Apr 28 11:56:34 2015] [error] Global symbol "$self" requires explicit package name at /opt/otrs//Kernel/Config.pm line 88.
\nBEGIN not safe after errors--compilation aborted at /opt/otrs//Kernel/Config.pm line 227.
\nCompilation failed in require at /opt/otrs/scripts/apache2-perl-startup.pl line 69.
\nBEGIN failed--compilation aborted at /opt/otrs/scripts/apache2-perl-startup.pl line 69.
\nCompilation failed in require at (eval 2) line 1.\n
[Tue Apr 28 11:56:34 2015] [error] Can't load Perl file: /opt/otrs/scripts/apache2-perl-startup.pl for server localhost.localdomain:0, exiting...
thanks in advance
regards
GK