diff --git a/build/lemonldap-ng/doc/index/alphabetical.html b/build/lemonldap-ng/doc/index/alphabetical.html index b2509bb15..af6f0a7de 100644 --- a/build/lemonldap-ng/doc/index/alphabetical.html +++ b/build/lemonldap-ng/doc/index/alphabetical.html @@ -16,4 +16,4 @@ -

Alphabetical Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 

Back to main index

A

activedirectoryminihowto
applications
authapache
authbasic
authcas
authchoice
authdbi
authldap
authmulti
authnull
authopenid
authproxy
authremote
authsaml
authslave
authssl
authtwitter
authyubikey

B

browseablesessionbackend
bugzilla

C

cda
changeconfbackend
conferences
configlocation
configvhost
contact
customfunctions

D

default_sidebar
documentation
dokuwiki
download
drupal

E

error
exportedvars
extendedfunctions

F

features
federationproxy
fileconfbackend
filesessionbackend
formreplay

G

googleapps

H

header_remote_user_conversion
highavailability

I

idpcas
idpopenid
idpsaml
installdeb
installrpm
installtarball

L

ldapconfbackend
ldapminihowto
ldapsessionbackend
liferay
logoutforward
logs

M

managerprotection
mediawiki
memcachedsessionbackend
menu1
mrtg
mysqlminihowto

N

nosqlsessionbackend
notifications

O

obm

P

parameterlist
passwordstore
performances
phpldapadmin
playground
portal
portalcustom
portalmenu
prereq
presentation

Q

quickstart

R

rbac
redirections
references
resetpassword

S

samlservice
screenshots
security
selfmadeapplication
sessions
soapconfbackend
soapminihowto
soapservices
soapsessionbackend
spring
sqlconfbackend
sqlsessionbackend
ssocookie
start
status
sympa
syntax

T

tomcat
translations

U

upgrade

W

writingrulesand_headers

Z

zimbra



Back to main index

\ No newline at end of file +

Alphabetical Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 

Back to main index

A

B

C

D

E

F

G

H

I

L

M

N

O

P

Q

R

S

T

U

W

Z




\ No newline at end of file diff --git a/build/lemonldap-ng/doc/media/logos/logo_abuledu.png b/build/lemonldap-ng/doc/media/logos/logo_abuledu.png new file mode 100644 index 000000000..23c4389f1 Binary files /dev/null and b/build/lemonldap-ng/doc/media/logos/logo_abuledu.png differ diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/authldap.html b/build/lemonldap-ng/doc/pages/documentation/1.1/authldap.html index 88343478d..50c29cc83 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/authldap.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/authldap.html @@ -216,10 +216,16 @@ And this as mail filter:
  • LDAP password encoding: can allow to manage old LDAP servers using specific encoding for passwords (default: utf-8).
  • +
  • Use reset attribute: enable to use the password reset attribute. This attribute is set by LemonLDAP::NG when password was reset by mail and the user choose to generate the password (default: enabled).
    +
  • +
  • Reset attribute: name of password reset attribute (default: pwdReset).
    +
  • +
  • Reset value: value to set in reset attribute to activate password reset (default: TRUE).
    +
  • - +

    Schema extension

    @@ -248,7 +254,7 @@ Of course, standard LDAP<

    - +

    OID prefix

    @@ -261,7 +267,7 @@ The prefix 1.3.6.1.4.1.10943 is owned by
    - +

    OpenLDAP schema

    @@ -302,4 +308,4 @@ You can add this object class to any entry of your directory.

    -
    \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/authslave.html b/build/lemonldap-ng/doc/pages/documentation/1.1/authslave.html index 09cab4c22..25841460f 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/authslave.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/authslave.html @@ -43,20 +43,20 @@ LL::NG Slave backend is a transparent backend to used when LL::NG portal is protected by another SSO:

    - +

    Configuration

    -In Manager, go in General Parameters > Authentication modules and choose Null for authentication, users or password module. +In Manager, go in General Parameters > Authentication modules and choose Slave for authentication or users module.

    @@ -65,7 +65,7 @@ Then, go in Slave parameters:

    @@ -87,4 +87,4 @@ You have then to declare HTTP
    - \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/notifications.html b/build/lemonldap-ng/doc/pages/documentation/1.1/notifications.html index 04c8fccfe..c60206832 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/notifications.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/notifications.html @@ -27,63 +27,154 @@

    -Since version 0.9.4, Lemonldap::NG can be used to notify some messages to users: if a user has a message, the message will be displayed when he will access to the portal. If the message contains checkboxes, the user has to check all of them else he can not access to the portal and get his session cookie. +Since version 0.9.4, LemonLDAP::NG can be used to notify some messages to users: if a user has a message, the message will be displayed when he will access to the portal. If the message contains check boxes, the user has to check all of them else he can not access to the portal and get his session cookie. +

    + +

    +When the user accept the notification, the reference is stored in his persistent session.

    - +

    Installation

    - +

    Activation

    -You just have to set “notification” to “activate” in the manager (or notification=1 in lemonldap-ng.ini, section “PORTAL”). +You just have to activate Notifications in the Manager (General Parameters > Advanced Parameters > Notifications > Activation) or in lemonldap-ng.ini: +

    +
    [portal]
    +notification = 1
    - -

    Storage

    -
    + +

    Storage

    +

    By default, notifications will be stored in the same database as configuration: -* if you use “File” system and your “dirName” is set to /usr/local/lemonldap-ng/conf/, the notifications will be stored in /usr/local/lemonldap-ng/notifications/ -* if you use “DBI” system, the notifications will be stored in the same database as configuration and in a table called “notifications”. You have to create the table by yourself&nbsp; -

    -
    CREATE TABLE 'notifications' (
    -  'date' datetime NOT NULL,
    -  'uid' varchar(255) NOT NULL,
    -  'ref' varchar(255) NOT NULL,
    -  'xml' longblob NOT NULL,
    -  'done' datetime DEFAULT NULL,
    -  PRIMARY KEY  ('date','uid','ref')
    -)
    +

    -You can change default parameters using the “notificationStorage” parameter with the same syntax as configStorage. + +You can change default parameters using the “notificationStorage” and “notificationStorageOptions” parameters with the same syntax as configuration storage parameters. To do this in Manager, go in General Parameters > Advanced Parameters > Notifications.

    - + +

    File

    +
    + +

    + +Parameters for File backend are the same as File configuration backend. +

    + +

    +

    You need to create yourself the directory and set write access to Apache user. For example: + +

    +
    +mkdir /usr/local/lemonldap-ng/notifications/
    +chown www-data /usr/local/lemonldap-ng/notifications/
    +
    + +

    + + +

    +

    + +
    + +

    DBI

    +
    + +

    + +Parameters for DBI backend are the same as DBI configuration backend. +

    + +

    +

    You have to create the table by yourself: + +

    +
    CREATE TABLE notifications (
    +  date datetime NOT NULL,
    +  uid varchar(255) NOT NULL,
    +  ref varchar(255) NOT NULL,
    +  cond varchar(255) DEFAULT NULL,
    +  xml longblob NOT NULL,
    +  done datetime DEFAULT NULL,
    +  PRIMARY KEY (date, uid,ref)
    +)
    + +

    + + +

    +

    + +
    + +

    Other

    +
    + +

    + +The notifications module uses a wildcard to manage notifications for all users. The default value of this wilcard is allusers, but you can change it if allusers is a known identifier in your system. +

    + +

    +To change it, edit lemonldap-ng.ini: + +

    +
    [all]
    +notificationWilcard = alluserscustom
    + +

    +Then creating a notification for alluserscustom will display the notification for all users. +

    + +
    +

    Using notification system

    - +

    Insert new notifications

    -New notifications can be insert using SOAP request (described in the WSDL file generated by buildPortalWSDL tool). +New notifications can be insert using SOAP request (described in the WSDL file generated by buildPortalWSDL tool). To activate SOAP on the portal:

    + +
    # SOAP functions for notification insertion (disabled by default)
    +<Location /index.pl/notification>
    +    Order deny,allow
    +    Deny from all
    +    Allow from 192.168.2.0/24
    +</Location>
    @@ -95,23 +186,33 @@ New notifications can be insert using XML files containing:

    - +

    Test notification

    @@ -180,5 +298,9 @@ Example : You've simply to insert a notification and connect to the portal using the same UID. You will be prompted.

    +

    +Try also to create a global notification (to the uid “allusers”), and connect with any user, the message will be prompted. +

    +
    - \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/parameterlist.html b/build/lemonldap-ng/doc/pages/documentation/1.1/parameterlist.html index 8dd9e8d34..6f9542607 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/parameterlist.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/parameterlist.html @@ -232,281 +232,320 @@ The attribute key name can be used directly in lemonldap-ng.ini or LDAP version ldapVersion ✔ - Cache backend localStorage ✔ ✔ ✔ + LDAP modify password reset attribute ldapUsePasswordResetAttribute ✔ - Local cache localStorage ✔ ✔ ✔ + LDAP password reset attribute name ldapPasswordResetAttribute ✔ - Cache backend options localStorageOptions ✔ ✔ ✔ + LDAP password reset attribute true value ldapPasswordResetAttributeValue ✔ - Local cache parameters localStorageOptions ✔ ✔ ✔ + Cache backend localStorage ✔ ✔ ✔ - Access rules locationRules ✔ + Local cache localStorage ✔ ✔ ✔ - Macros macros ✔ + Cache backend options localStorageOptions ✔ ✔ ✔ - Body for password mail mailBody ✔ + Local cache parameters localStorageOptions ✔ ✔ ✔ - Body for confirmation mail mailConfirmBody ✔ + Access rules locationRules ✔ - Subject for confirmation mail mailConfirmSubject ✔ + Macros macros ✔ - Mail From address mailFrom ✔ + Body for password mail mailBody ✔ - LDAP mail search filter mailLDAPFilter ✔ + Body for confirmation mail mailConfirmBody ✔ - Subject for password mail mailSubject ✔ + Subject for confirmation mail mailConfirmSubject ✔ - URL for mail reset mailUrl ✔ + Mail From address mailFrom ✔ - Manager menu organization managerCss ✔ + Reply address mailReplyTo ✔ - Manager theme managerCssTheme ✔ + Mail charset mailCharset ✔ - LDAP Bind DN managerDn ✔ + LDAP mail search filter mailLDAPFilter ✔ - LDAP Bind Password managerPassword ✔ + Subject for password mail mailSubject ✔ - Manager skin managerSkin ✔ + Mail reset request timeout mailTimeout ✔ - Manager tree autoClose managerTreeAutoClose ✔ + URL for mail reset mailUrl ✔ - Manager tree JQuery CSS file managerTreeJqueryCss ✔ + Session key containing email address mailSessionKey ✔ - Multi overridden parameters multi ✔ + Manager menu organization managerCss ✔ - Multi values separator multiValuesSeparator ✔ ✔ ✔ + Manager theme managerCssTheme ✔ - Notification activation notification ✔ + LDAP Bind DN managerDn ✔ - Notification backend notificationStorage ✔ + LDAP Bind Password managerPassword ✔ - Notification backend options notificationStorageOptions ✔ + Manager skin managerSkin ✔ - Display deleted sessions notifyDeleted ✔ + Manager tree autoClose managerTreeAutoClose ✔ - Display other sessions notifyOther ✔ + Manager tree JQuery CSS file managerTreeJqueryCss ✔ - Null authentication level nullAuthnLevel ✔ + Multi overridden parameters multi ✔ - OpenID authentication level openIdAuthnLevel ✔ + Multi values separator multiValuesSeparator ✔ ✔ ✔ - OpenID allowed domains openIdIDPList ✔ + Notification activation notification ✔ ✔ - OpenID secret token openIdSecret ✔ + Notification backend notificationStorage ✔ ✔ - Password backend passwordDB ✔ + Notification backend options notificationStorageOptions ✔ ✔ - Force port in redirection port ✔ + Notification uid for all users notificationWildcard ✔ ✔ - Portal URL portal ✔ ✔ + Display deleted sessions notifyDeleted ✔ - Anti frame protection portalAntiFrame ✔ + Display other sessions notifyOther ✔ - Allow form autocompletion portalAutocomplete ✔ + Null authentication level nullAuthnLevel ✔ - Display applications list portalDisplayAppslist ✔ + OpenID authentication level openIdAuthnLevel ✔ - Display change password module portalDisplayChangePassword ✔ + OpenID allowed domains openIdIDPList ✔ - Display logout module portalDisplayLogout ✔ + OpenID secret token openIdSecret ✔ - Display reset password form portalDisplayResetPassword ✔ + Password backend passwordDB ✔ - Open links in new window portalOpenLinkInNewWindow ✔ + Force port in redirection port ✔ - Require old password (change) portalRequireOldPassword ✔ + Portal URL portal ✔ ✔ - Skin name portalSkin ✔ + Anti frame protection portalAntiFrame ✔ - User name session field portalUserAttr ✔ + Allow form autocompletion portalAutocomplete ✔ - Protection scheme protection ✔ ✔ + Display applications list portalDisplayAppslist ✔ - Regular expression for random password randomPasswordRegexp ✔ + Display change password module portalDisplayChangePassword ✔ - Delay between check of local configuration reloadTime ✔ + Display logout module portalDisplayLogout ✔ - Remote cookie name remoteCookieName ✔ + Display reset password form portalDisplayResetPassword ✔ - Proxy cookie name remoteCookieName ✔ + Open links in new window portalOpenLinkInNewWindow ✔ - Remote Session backend remoteGlobalStorage ✔ + Require old password (change) portalRequireOldPassword ✔ - Remote Session backend options remoteGlobalStorageOptions ✔ + Skin name portalSkin ✔ - Remote portal remotePortal ✔ + User name session field portalUserAttr ✔ - SAML Session backend samlStorage ✔ + Protection scheme protection ✔ ✔ - SAML Session backend options samlStorageOptions ✔ + Regular expression for random password randomPasswordRegexp ✔ - Cookie security securedCookie ✔ ✔ + Delay between check of local configuration reloadTime ✔ - Delete other session if IP differs singleIP ✔ + Remote cookie name remoteCookieName ✔ - Delete other session singleSession ✔ + Proxy cookie name remoteCookieName ✔ - Do not allow several users for 1 IP singleUserByIP ✔ + Remote Session backend remoteGlobalStorage ✔ - SMTP server SMTPServer ✔ + Remote Session backend options remoteGlobalStorageOptions ✔ - SMTP user SMTPAuthUser ✔ + Remote portal remotePortal ✔ - SMTP password SMTPAuthPass ✔ + SAML Session backend samlStorage ✔ - SOAP activation Soap ✔ + SAML Session backend options samlStorageOptions ✔ - Proxy portal URL soapAuthService ✔ + Cookie security securedCookie ✔ ✔ - Proxy session SOAP end point soapSessionService ✔ + Delete other session if IP differs singleIP ✔ - SSL authentication level SSLAuthnLevel ✔ + Delete other session singleSession ✔ - SSL map with LDAP attribute SSLLDAPField ✔ + Do not allow several users for 1 IP singleUserByIP ✔ - SSL force SSL authentication SSLRequire ✔ + SMTP server SMTPServer ✔ - SSL user field in certificate SSLVar ✔ + SMTP user SMTPAuthUser ✔ - Status module activation status ✔ + SMTP password SMTPAuthPass ✔ - Store password in session storePassword ✔ + SOAP activation Soap ✔ - Sympa mail session key sympaMailKey ✔ + Proxy portal URL soapAuthService ✔ - Sympa shared secret sympaSecret ✔ + Proxy session SOAP end point soapSessionService ✔ - Syslog facility syslog ✔ + SSL authentication level SSLAuthnLevel ✔ - Session lifetime for cronjob timeout ✔ + SSL map with LDAP attribute SSLLDAPField ✔ - Trusted domains trustedDomains ✔ + SSL force SSL authentication SSLRequire ✔ - Twitter application name twitterAppName ✔ + SSL user field in certificate SSLVar ✔ - Twitter authentication level twitterAuthnLevel ✔ + Status module activation status ✔ - Twitter application key twitterKey ✔ + Store password in session storePassword ✔ - Twitter application secret twitterSecret ✔ + Sympa mail session key sympaMailKey ✔ - User backend userDB ✔ + Sympa shared secret sympaSecret ✔ - Use redirect on error useRedirectOnError ✔ + Syslog facility syslog ✔ - Use Safe Jail useSafeJail ✔ ✔ + Session lifetime for cronjob timeout ✔ - DBI Pivot from user table userPivot ✔ + Trusted domains trustedDomains ✔ - Use XForwardedFor for IP useXForwardedForIP ✔ ✔ + Twitter application name twitterAppName ✔ - Data to store as REMOTE_USER (used also in Apache logs) whatToTrace ✔ ✔ + Twitter authentication level twitterAuthnLevel ✔ - Zimbra account session key zimbraAccountKey ✔ + Twitter application key twitterKey ✔ - Zimbra account type zimbraBy ✔ + Twitter application secret twitterSecret ✔ - Zimbra preauthentication key zimbraPreAuthKey ✔ + User backend userDB ✔ - Zimbra local SSO URL pattern zimbraSsoUrl ✔ + Use redirect on error useRedirectOnError ✔ - Zimbra preauthentication URL zimbraUrl ✔ + Use Safe Jail useSafeJail ✔ ✔ + + + DBI Pivot from user table userPivot ✔ + + + Use XForwardedFor for IP useXForwardedForIP ✔ ✔ + + + Data to store as REMOTE_USER (used also in Apache logs) whatToTrace ✔ ✔ + + + Zimbra account session key zimbraAccountKey ✔ + + + Zimbra account type zimbraBy ✔ + + + Zimbra preauthentication key zimbraPreAuthKey ✔ + + + Zimbra local SSO URL pattern zimbraSsoUrl ✔ + + + Zimbra preauthentication URL zimbraUrl ✔ + + + Yubikey client ID yubikeyClientID ✔ + + + Yubikey secret key yubikeySecretKey ✔ + + + Yubikey public ID size yubikeyPublicIDSize ✔ + + + Yubikey authentication level yubikeyAuthnLevel ✔ + + + Hide old password in reset form hideOldPassword ✔

    - +

    Configuration backend parameters

    @@ -558,4 +597,4 @@ The attribute key name can be used directly in lemonldap-ng.ini or
    - \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/portalcustom.html b/build/lemonldap-ng/doc/pages/documentation/1.1/portalcustom.html index 1d3eee830..8c7495457 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/portalcustom.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/portalcustom.html @@ -115,7 +115,29 @@ ln -s ../pastel/*.tpl .

    -Then you only have to write myskin/css/styles.css and add your media to myskin/images. +We include some template files that can be customized: +

    + + +

    + +To use custom files, delete links and copy them into your skin folder: + +

    +
    +rm custom*
    +cp ../pastel/custom* .
    +
    + +

    +Then you only have to write myskin/css/styles.css and add your media to myskin/images. Put all custom HTML code in the custom template files.

    @@ -123,7 +145,7 @@ To configure your new skin in Manager, select the custom skin, and enter your sk

    - +

    Other parameters

    - \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/resetpassword.html b/build/lemonldap-ng/doc/pages/documentation/1.1/resetpassword.html index a04045cae..2f5ac41c6 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/resetpassword.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/resetpassword.html @@ -39,28 +39,35 @@ Kinematics:

      -
    1. User enters his email in the password reset form
      +
    2. User enters his email (or another information) in the password reset form
    3. -
    4. LL::NG try to find the user in users database
      +
    5. LL::NG try to find the user in users database with the given information
    6. A mail with a token is sent to user
    7. The user click on the link in the mail
    8. -
    9. LL::NG validate the token and set a random password
      +
    10. LL::NG validate the token and propose a password change form
    11. -
    12. The random password is sent to user
      +
    13. The user can choose a new password or ask to generate one
      +
    14. +
    15. The new password is sent to user

    -

    If LDAP backend is used, and LDAP password policy is enabled, the pwdReset flag is set to TRUE, so that the user is forced to change his password on next connection. +

    If LDAP backend is used, and LDAP password policy is enabled, the 'password reset flag is set to true when password is generated, so that the user is forced to change his password on next connection. This feature can be disabled in LDAP configuration. +

    +

    + +

    +

    If the user do a new password reset request but there is already a request pending, the user can ask the confirmation mail to be resent. The request validity time is a configuration parameter.

    - +

    Configuration

    @@ -73,11 +80,15 @@ The reset password link must be activated, see
    SMTP Server: IP or hostname of the SMTP server
    +
  • SMTP:
    +
      +
    • SMTP Server: IP or hostname of the SMTP server
    • -
    • SMTP User: SMTP user if authentication is required
      +
    • SMTP User: SMTP user if authentication is required
    • -
    • SMTP Password: SMTP password if authentication is required
      +
    • SMTP Password: SMTP password if authentication is required
      +
    • +
  • @@ -100,19 +111,29 @@ Then go in Manager, General Parameters » Advanced Parameters

      -
    • Page URL: URL of password reset page (default: [PORTAL]/mail.pl)
      +
    • Mail headers:
      +
        +
      • Mail sender: address seen in the “From” field (default: noreply@[DOMAIN])
      • -
      • Mail sender: address seen in the “From” field (default: noreply@[DOMAIN])
        +
      • Reply address: address seen in the “Reply-To” field
      • -
      • Success mail subject: Subject of mail sent when password is changed (default: [LemonLDAP::NG] Your new password)
        +
      • Mail charset: Charset used for the body of the mail (default: utf-8)
      • -
      • Success mail content (optional): Content of mail sent when password is changed
        +
    • -
    • Confirmation mail subject: Subject of mail sent when password change is asked (default: [LemonLDAP::NG] Password reset confirmation)
      +
    +
      +
    • Mail content:
      +
        +
      • Success mail subject: Subject of mail sent when password is changed (default: [LemonLDAP::NG] Your new password)
      • -
      • Confirmation mail content (optional): Content of mail sent when password change is asked
        +
      • Success mail content (optional): Content of mail sent when password is changed
      • -
      • Regexp for password generation: Regular expression used to generate the password (default: [A-Z]{3}[a-z]{5}.\d{2})
        +
      • Confirmation mail subject: Subject of mail sent when password change is asked (default: [LemonLDAP::NG] Password reset confirmation)
        +
      • +
      • Confirmation mail content (optional): Content of mail sent when password change is asked
        +
      • +
    @@ -135,6 +156,20 @@ If you define mail contents in Manager,
    Other:
    +
      +
    • Page URL: URL of password reset page (default: [PORTAL]/mail.pl)
      +
    • +
    • Regexp for password generation: Regular expression used to generate the password (default: [A-Z]{3}[a-z]{5}.\d{2})
      +
    • +
    • Validity time of a password reset request: number of seconds for password reset request validity. During this period, user can ask the confirmation mail to be resent (default: session timeout value)
      +
    • +
    • Session key containing mail address: name of the session key containing email address. This value will be used to know to which recipient the has to be sent (default: mail).
      +
    • +
    + +
    - \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/securetoken.html b/build/lemonldap-ng/doc/pages/documentation/1.1/securetoken.html new file mode 100644 index 000000000..2bf4caf91 --- /dev/null +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/securetoken.html @@ -0,0 +1,90 @@ + + + + + + + + + + + + + + + + + +
    + + + + +

    Secure Token Handler

    +
    + +
    + +

    Presentation

    +
    + +

    + +The Secure Token Handler is a special Handler that create a token for each request and send it to the protected application. The real user identifier is stored in a Memcached server and the protected application can the request the Memcached server to get user identifier. +

    + +

    +This mechanism allow to do SSO on application with an unsafe link between Handler and the application, but with a safe link with the Memcached server. +

    + +
    + +

    Configuration

    +
    + +
    + +

    Virtual host in Apache

    +
    + +

    + +Configure the virtual host like other protected virtual host but use Secure Token Handler instead of default Handler. +

    +
    <VirtualHost *:80>
    +       ServerName secure.example.com
    + 
    +       # Load Sympa Handler
    +       PerlRequire __HANDLERDIR__/MyHandlerSecureToken.pm
    +       PerlHeaderParserHandler My::SecureToken
    + 
    +       ...
    + 
    +</VirtualHost>
    + +
    + +

    Handler parameters

    +
    + +

    + +Go in Manager, Default parameters » Advanced parameters » Special handlers » Secure Token, and edit the different keys: +

    +
      +
    • Memcached servers: addresses of Memcached servers, separated with spaces.
      +
    • +
    • Token expiration: time in seconds for token expiration (remove from Memcached server).
      +
    • +
    • Attribute to store: the session key that will be stored in Memcached.
      +
    • +
    • Protected URLs: Regexp of URLs for which the secure token will be sent, separated by spaces
      +
    • +
    • Header name: name of the HTTP header carrying the secure token.
      +
    • +
    + +
    +
    \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/start.html b/build/lemonldap-ng/doc/pages/documentation/1.1/start.html index 57579767b..63ca139cf 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/start.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/start.html @@ -316,7 +316,7 @@ Sessions are stored using +
    @@ -338,12 +338,14 @@ Sessions are stored using
    Forward logout to applications
    +
  • +
  • - +

    Mini howtos

    @@ -372,7 +374,7 @@ Sessions are stored using +

    Exploitation

    @@ -401,4 +403,4 @@ Sessions are stored using
    \ No newline at end of file +
    \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/1.1/upgrade.html b/build/lemonldap-ng/doc/pages/documentation/1.1/upgrade.html index 8dd2e73cf..0aeeca2d1 100644 --- a/build/lemonldap-ng/doc/pages/documentation/1.1/upgrade.html +++ b/build/lemonldap-ng/doc/pages/documentation/1.1/upgrade.html @@ -34,8 +34,63 @@

    If you upgrade from older versions, please follow first upgrade documentation from previous release.

    -

    - \ No newline at end of file + +

    Custom skins

    +
    + +

    + +You may have develop a custom skin following the skin customization documentation. In this case, you may face errors when displaying the portal, because some new template files are required with LemonLDAP::NG 1.1: +

    + + +

    + +The Yubikey form should be linked like the standard template files: + +

    +
    +ln -s ../pastel/yubikeyform.tpl .
    +
    + +

    +Custom templates must be copied, you will then be able to add your custom content into it: + +

    +
    +cp ../pastel/custom* .
    +
    + +
    + +

    DBI notifications backend

    +
    + +

    + +We added the possibility to define conditions in notifications. This implies no change for File backend, but a little update of table structure for DBI backend: +

    +
    ALTER TABLE `notifications` ADD `cond` VARCHAR( 255 ) NULL AFTER `ref`
    + +
    + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/documentation/conferences.html b/build/lemonldap-ng/doc/pages/documentation/conferences.html index 29e4737ae..4d03d9331 100644 --- a/build/lemonldap-ng/doc/pages/documentation/conferences.html +++ b/build/lemonldap-ng/doc/pages/documentation/conferences.html @@ -39,12 +39,24 @@ Joind.in - Solutions Linux Paris Clément OUDOT FR Lanyrd + JCOS Lyon Clément OUDOT FR SlideShare
    +Lanyrd + + + Solutions Linux Paris Clément OUDOT FR SlideShare
    +Lanyrd + + + FPW Paris Clément OUDOT FR SlideShare
    +Lanyrd + + + RMLL/LSM Strasbourg Clément OUDOT FR Lanyrd - +

    2010

    @@ -64,7 +76,7 @@ Clément OUDOT
    FR +

    2009

    @@ -87,4 +99,4 @@ Clément OUDOT
    FR \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/download.html b/build/lemonldap-ng/doc/pages/download.html index eb07faa20..b94cd65dd 100644 --- a/build/lemonldap-ng/doc/pages/download.html +++ b/build/lemonldap-ng/doc/pages/download.html @@ -32,7 +32,7 @@ -

    Stable version (1.0.5)

    +

    Stable version (1.0.6)

    @@ -40,7 +40,7 @@

    Tarball

    @@ -49,9 +49,9 @@

    RPM

    @@ -77,7 +77,7 @@ You can:

    Debian

    @@ -101,7 +101,7 @@ You can:

    - +

    Older versions

    diff --git a/build/lemonldap-ng/doc/pages/references.html b/build/lemonldap-ng/doc/pages/references.html index e9e84fc22..b765ad10b 100644 --- a/build/lemonldap-ng/doc/pages/references.html +++ b/build/lemonldap-ng/doc/pages/references.html @@ -32,6 +32,25 @@ They use LemonLDAP::NG!
    +

    AbulEdu

    +
    + +

    + + + +

    + + + + + + + +
    Nb users ~40 000
    Authentication portal https://auth.abuledu.net/
    + +
    +

    Région Basse-Normandie

    @@ -67,7 +86,7 @@ They use LemonLDAP::NG!

    - +

    Gendarmerie Nationale

    @@ -95,7 +114,7 @@ They use LemonLDAP::NG!

    - +

    Bibliothèque Publique d'Information

    @@ -117,7 +136,7 @@ They use LemonLDAP::NG!
    - +

    LINAGORA

    @@ -142,7 +161,7 @@ They use LemonLDAP::NG!
    - +

    SGS

    @@ -169,7 +188,7 @@ They use LemonLDAP::NG!

    - +

    South Bay Community Network

    @@ -195,4 +214,4 @@ Protected sites: - \ No newline at end of file + \ No newline at end of file diff --git a/build/lemonldap-ng/doc/pages/start.html b/build/lemonldap-ng/doc/pages/start.html index 58732f456..bb732039f 100644 --- a/build/lemonldap-ng/doc/pages/start.html +++ b/build/lemonldap-ng/doc/pages/start.html @@ -283,6 +283,6 @@ LemonLDAP::NG is the first SSO softwar

    - + \ No newline at end of file