diff --git a/doc/index/alphabetical.html b/doc/index/alphabetical.html index 68fa2a333..597299d34 100644 --- a/doc/index/alphabetical.html +++ b/doc/index/alphabetical.html @@ -16,4 +16,4 @@ -

Alphabetical Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 

Back to main index

A

activedirectoryminihowto
applications
authapache
authbasic
authbrowserid
authcas
authchoice
authdbi
authdemo
authldap
authmulti
authnull
authopenid
authproxy
authradius
authremote
authsaml
authslave
authssl
authtwitter
authyubikey

B

browseablesessionbackend
bugzilla

C

cda
changeconfbackend
conferences
configlocation
configvhost
contact
customfunctions

D

default_sidebar
django
documentation
dokuwiki
download
drupal

E

error
exportedvars
extendedfunctions

F

features
federationproxy
fileconfbackend
filesessionbackend
formreplay

G

googleapps

H

handlerauthbasic
header_remote_user_conversion
highavailability

I

idpcas
idpopenid
idpsaml
installdeb
installrpm
installtarball
internalproxy

L

ldapconfbackend
ldapminihowto
ldapsessionbackend
liferay
limesurvey
loginhistory
logoutforward
logs

M

managerprotection
mediawiki
memcachedsessionbackend
menu1
mrtg
mysqlminihowto

N

nosqlsessionbackend
notifications

O

obm

P

parameterlist
passwordstore
performances
phpldapadmin
playground
portal
portalcustom
portalmenu
prereq
presentation
press

Q

quickstart

R

rbac
redirections
references
resetpassword

S

safejail
samlservice
screenshots
securetoken
security
selfmadeapplication
sessions
soapconfbackend
soapminihowto
soapservices
soapsessionbackend
spring
sqlconfbackend
sqlsessionbackend
ssocookie
start
status
sympa
syntax

T

tomcat
translations

U

upgrade

V

variables

W

writingrulesand_headers

Z

zimbra



Back to main index

\ No newline at end of file +

Alphabetical Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 

Back to main index

A

B

C

D

E

F

G

H

I

L

M

N

O

P

Q

R

S

T

U

V

W

Z




\ No newline at end of file diff --git a/doc/pages/default_sidebar.html b/doc/pages/default_sidebar.html index 406028948..8961218c3 100644 --- a/doc/pages/default_sidebar.html +++ b/doc/pages/default_sidebar.html @@ -21,6 +21,10 @@
+

+ +

+

Sponsored by

diff --git a/doc/pages/documentation/1.3/activedirectoryminihowto.html b/doc/pages/documentation/1.3/activedirectoryminihowto.html index 9828568a5..1d622f13d 100644 --- a/doc/pages/documentation/1.3/activedirectoryminihowto.html +++ b/doc/pages/documentation/1.3/activedirectoryminihowto.html @@ -22,52 +22,37 @@ -

Using Lemonldap::NG with Active-Directory

+

Using LemonLDAP::NG with Active-Directory

- -

Using Active-Directory as authentication backend

+ +

Authentication with login/password

-To use Active-Directory as LDAP backend, you must change few things in the manager : +To use Active Directory as LDAP backend, you must change few things in the manager :

    -
  • Use “LDAP” as authentication and userDB backends,
    +
  • Use “Active Directory” as authentication, userDB and passwordDBbackends,
  • -
  • Configure authentication filter and mail filter (“General Parameters » Authentication modules » LDAP parameters » Filters”) with:
    -
  • -
-
-(&(sAMAccountName=$user)(objectClass=person))
-(&(mail=$mail)(objectClass=person))
-
-
  • Export sAMAccountName in a variable declared in exported variables
  • Change the user attribute to store in Apache logs (“General Parameters » Logs » REMOTE_USER”): use the variable declared above
  • -
  • Enable password modify extended operation if you want to change password in AD
    -
- -

Using Kerberos

+ +

Authentication with Kerberos

- -

- -Two steps here: -

  • Choose “Apache” as authentication module (“General Parameters » Authentication modules » Authentication module”)
  • -
  • Configure the Apache server that host the portal
    +
  • Configure the Apache server that host the portal to use the Apache Kerberos authentication module
-
\ No newline at end of file +
\ No newline at end of file diff --git a/doc/pages/documentation/1.3/authad.html b/doc/pages/documentation/1.3/authad.html new file mode 100644 index 000000000..8fdabce88 --- /dev/null +++ b/doc/pages/documentation/1.3/authad.html @@ -0,0 +1,66 @@ + + + + + + + + + + + + + + + + + +
+ + + + +

Active Directory

+
+ + + + + + + +
Authentication Users Password
+ +
+ +

Presentation

+
+ +

+ +The Active Directory module is based on the LDAP module, with these features: +

+ + +
+ +

Configuration

+
+ +

+ +The configuration is the same as the LDAP module. + +

+ +
+
\ No newline at end of file diff --git a/doc/pages/documentation/1.3/authgoogle.html b/doc/pages/documentation/1.3/authgoogle.html new file mode 100644 index 000000000..c84e0d4cf --- /dev/null +++ b/doc/pages/documentation/1.3/authgoogle.html @@ -0,0 +1,87 @@ + + + + + + + + + + + + + + + + + +
+ + + + +

Google

+
+ + + + + + + +
Authentication Users Password
+ +
+ +

Presentation

+
+ +

+ +Google proposes to allow applications to reuse its own authentication process using OpenID protocol (it means, if your are connected to Google, other applications can trust Google and let you in). +

+ +
+ +

Configuration

+
+ +

+ +In Manager, go in General Parameters > Authentication modules and choose Google for authentication module. This will use email as login name (for accounting, session explorer,…). If you want to access to other datas, you have to use Google in General Parameters > Authentication modules > User module. Then in exported variables, you can ask only for : +

+ + +

+ +Use the name you want but this values as value. If you want to require that a field is set, add ”!” before the key name : +

+ + +

+ +

A specific persistent session is created with this module, to store attribute values returned by Google. If this session is lost, Google will ask a confirmation for each requested attribute. +

+ +

+ +
+
\ No newline at end of file diff --git a/doc/pages/documentation/1.3/authldap.html b/doc/pages/documentation/1.3/authldap.html index 13d631fc2..e20fd12ab 100644 --- a/doc/pages/documentation/1.3/authldap.html +++ b/doc/pages/documentation/1.3/authldap.html @@ -55,7 +55,7 @@

-This works with every LDAP v2 or v3 server, including Active Directory. +This works with every LDAP v2 or v3 server, including Active Directory.

@@ -71,7 +71,7 @@ This works with every LDA - +

Configuration

@@ -80,8 +80,14 @@ This works with every LDA In Manager, go in General Parameters > Authentication modules and choose LDAP for authentication, users and/or password modules.

+

+

+For Active Directory, choose Active Directory instead of LDAP. +

+

+
- +

Authentication level

@@ -107,7 +113,7 @@ As LDAP is a lo

- +

Connection

- +

Filters

@@ -160,7 +166,7 @@ As LDAP is a lo

-For Active Directory, use this as authentication filter: +For Active Directory, the default authentication filter is:

@@ -169,7 +175,7 @@ For Active Directory, use this as authentication filter:
 
 

-And this as mail filter: +And the mail filter is:

@@ -183,7 +189,7 @@ And this as mail filter:
 

- +

Groups

- +

Password

- +

Schema extension

@@ -254,7 +260,7 @@ Of course, standard LDAP<

- +

OID prefix

@@ -267,7 +273,7 @@ The prefix 1.3.6.1.4.1.10943 is owned by
- +

OpenLDAP schema

@@ -308,4 +314,4 @@ You can add this object class to any entry of your directory.

-
\ No newline at end of file + \ No newline at end of file diff --git a/doc/pages/documentation/1.3/start.html b/doc/pages/documentation/1.3/start.html index da7e10eef..b298bd6ee 100644 --- a/doc/pages/documentation/1.3/start.html +++ b/doc/pages/documentation/1.3/start.html @@ -120,63 +120,69 @@ Backend Authentication Users Password - Apache (Kerberos, NTLM, OTP, ...) ✔ + Active Directory ✔ ✔ - Backend choice by users ✔ ✔ ✔ + Apache (Kerberos, NTLM, OTP, ...) ✔ - BrowserID (Mozilla Persona) ✔ + Backend choice by users ✔ ✔ ✔ - CAS ✔ + BrowserID (Mozilla Persona) ✔ - Databases (DBI) ✔ ✔ ✔ + CAS ✔ - Demonstration ✔ ✔ ✔ + Databases (DBI) ✔ ✔ ✔ - LDAP (including Active Directory) ✔ ✔ ✔ + Demonstration ✔ ✔ ✔ - Null ✔ ✔ ✔ + Google ✔ ✔ - OpenID ✔ ✔ + LDAP ✔ ✔ ✔ - Proxy LL::NG ✔ ✔ + Null ✔ ✔ ✔ - Radius ✔ + OpenID ✔ ✔ - Remote LL::NG ✔ ✔ + Proxy LL::NG ✔ ✔ - SAML 2.0 / Shibboleth ✔ ✔ + Radius ✔ - Slave ✔ ✔ + Remote LL::NG ✔ ✔ - SSL ✔ + SAML 2.0 / Shibboleth ✔ ✔ - Stack multiple backends ✔ ✔ + Slave ✔ ✔ - Twitter ✔ + SSL ✔ + Stack multiple backends ✔ ✔ + + + Twitter ✔ + + Yubikey ✔ - +

Configuration database

@@ -216,7 +222,7 @@

- +

Sessions database

@@ -259,7 +265,7 @@ Sessions are stored using +

Identity provider

@@ -296,7 +302,7 @@ Sessions are stored using +

Applications protection

@@ -321,7 +327,7 @@ Sessions are stored using +

Advanced features

-

Stable version (1.2.4)

+

Stable version (1.2.5)

@@ -40,7 +40,7 @@

Tarball

@@ -71,9 +71,9 @@ You can:
RHEL/CentOS 5
@@ -82,9 +82,9 @@ You can:
RHEL/CentOS 6
@@ -113,12 +113,12 @@ You can:

- +

Older versions

diff --git a/doc/pages/start.html b/doc/pages/start.html index b9b284668..99ca67ab6 100644 --- a/doc/pages/start.html +++ b/doc/pages/start.html @@ -285,6 +285,6 @@ LemonLDAP::NG is the first SSO softwar

- +
\ No newline at end of file