Vanilla 1 is no longer supported or maintained. If you need a copy, you can get it here.
HackerOne users: Testing against this community violates our program's Terms of Service and will result in your bounty being denied.
Active Directory Integration
Hello,
I'd like for my users to be able to sign into a secure folder (based on AD usernames and passwords) on my website and be able to immediately use the Vanilla forum (without creating seperate forum accounts or signing in a second time). The root directory of the forum is within the secure folder. Is this possible? Thanks for any help!
0
This discussion has been closed.
Comments
Warning: Use this code only as a template for your own work. I do not guarentee that it will work for you without modification (this is *not* an extension).
Installation: Extract the file into library/People and set
$Configuration['AUTHENTICATION_MODULE'] = 'People/People.Class.LdapAuthenticator.php';
in conf/settings.php to enable it.
With some work, it should be possible to convert to Active Directory. Most of the configuration settings are at the top of the file. This implementation uses LDAP exclusively for authentication, so when a user attempts to login, the LDAP server is immediately checked. If successful, the Vanilla database is checked to see if the user already exists. If not, a new Vanilla user is created (so that user settings can be stored, among other reasons). The password stored in the Vanilla database is totally disregarded. For this reason, it's best to set
$Configuration['ALLOW_PASSWORD_CHANGE'] = 0;
in conf/settings.php. This means that you will need to provide some other way for users to change this password (which presumably you do, given that you're using Active Directory).
Note that this implemention does not use any fancy caching techniques, so if you have a heavy load, this will put some strain on your AD server. Also, there is a debug flag that you can set at the top of the file that will write out debugging information to a text file (currently /tmp/vanilla_ldap.log...see the bottom of the file).
http://jdve.yi.org/downloads/People.Class.LdapAuthenticator.zip
Hope this is helpful to somebody.
Jonathan
Hint: I had to set LDAP_USE_TLS in the authentication module to "false" and set OD to allow LDAPv2 binds in slapd.conf. (Add "allow bind_v2" to /etc/slapd.conf and restart OD.) While less secure, this seemed to be safer and easier than possibly borking my LDAP server trying to get it to handle TLS. I wouldn't do this if both servers were not behind the same firewall.