</code></pre></div> </div> <p>This will then assign the guest user to all authenticated users.</p> <h3 id=http-authentication-ad-authorization>HTTP Authentication / AD Authorization</h3> <p>Config option: <code>ad-authorization</code></p> <p>This module is a combination of <strong><em>http-auth</em></strong> and <strong><em>active_directory</em></strong></p> <p>LibreNMS will expect the user to have authenticated via your webservice already (e.g. using Kerberos Authentication in Apache) but will use Active Directory lookups to determine and assign the role(s) of a user. The roles will be calculated by using AD group membership information as the <strong><em>active_directory</em></strong> module does.</p> <p>The configuration is the same as for the <strong><em>active_directory</em></strong> module with two extra, optional options: auth_ad_binduser and auth_ad_bindpassword. These should be set to a AD user with read capabilities in your AD Domain in order to be able to perform searches. If these options are omitted, the module will attempt an anonymous bind (which then of course must be allowed by your Active Directory server(s)).</p> <p>There is also one extra option for controlling user information caching: auth_ldap_cache_ttl. This option allows to control how long user information (user_exists, userid, roles) are cached within the PHP Session. The default value is 300 seconds. To disable this caching (highly discourage) set this option to 0.</p> <div class="admonition setting"> <p class=admonition-title>auth/ad</p> <div class=highlight><pre><span></span><code>lnms<span class=w> </span>config:set<span class=w> </span>auth_ad_binduser<span class=w> </span>ad_binduser
0 commit comments