* * and Joseph Engo * * Authentication based on LDAP Server * * Copyright (C) 2000, 2001 Joseph Engo * * Copyright (C) 2002, 2003 Lars Kneschke * * ------------------------------------------------------------------------ * * This library is part of the eGroupWare API * * http://www.egroupware.org/api * * ------------------------------------------------------------------------ * * This library is free software; you can redistribute it and/or modify it * * under the terms of the GNU Lesser General Public License as published by * * the Free Software Foundation; either version 2.1 of the License, * * or any later version. * * This library is distributed in the hope that it will be useful, but * * WITHOUT ANY WARRANTY; without even the implied warranty of * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. * * See the GNU Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * * along with this library; if not, write to the Free Software Foundation, * * Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * \**************************************************************************/ /* $Id$ */ class auth_ { var $previous_login = -1; /** * authentication against LDAP * * @param string $username username of account to authenticate * @param string $passwd corresponding password * @return boolean true if successful authenticated, false otherwise */ function authenticate($username, $passwd) { // allow non-ascii in username & password $username = $GLOBALS['egw']->translation->convert($username,$GLOBALS['egw']->translation->charset(),'utf-8'); $passwd = $GLOBALS['egw']->translation->convert($passwd,$GLOBALS['egw']->translation->charset(),'utf-8'); if(!$ldap = $GLOBALS['egw']->common->ldapConnect()) { $GLOBALS['egw']->log->message('F-Abort, Failed connecting to LDAP server for authenication, execution stopped'); $GLOBALS['egw']->log->commit(); return False; } /* Login with the LDAP Admin. User to find the User DN. */ if(!@ldap_bind($ldap, $GLOBALS['egw_info']['server']['ldap_root_dn'], $GLOBALS['egw_info']['server']['ldap_root_pw'])) { return False; } /* find the dn for this uid, the uid is not always in the dn */ $attributes = array('uid','dn','givenName','sn','mail','uidNumber','gidNumber','shadowExpire'); $filter = $GLOBALS['egw_info']['server']['ldap_search_filter'] ? $GLOBALS['egw_info']['server']['ldap_search_filter'] : '(uid=%user)'; $filter = str_replace(array('%user','%domain'),array(ldap::quote($username),$GLOBALS['egw_info']['user']['domain']),$filter); if ($GLOBALS['egw_info']['server']['account_repository'] == 'ldap') { $filter = "(&$filter(objectclass=posixaccount))"; } $sri = ldap_search($ldap, $GLOBALS['egw_info']['server']['ldap_context'], $filter, $attributes); $allValues = ldap_get_entries($ldap, $sri); if ($allValues['count'] > 0) { if ($GLOBALS['egw_info']['server']['case_sensitive_username'] == true && $allValues[0]['uid'][0] != $username) { return false; } if ($GLOBALS['egw_info']['server']['account_repository'] == 'ldap' && isset($allValues[0]['shawdowexpire']) && $allValues[0]['shawdowexpire'][0]*24*3600 < time()) { return false; // account is expired } $userDN = $allValues[0]['dn']; // try to bind as the user with user suplied password // only if a non-empty password given, in case anonymous search is enabled if (!empty($passwd) && @ldap_bind($ldap, $userDN, $passwd)) { if ($GLOBALS['egw_info']['server']['account_repository'] != 'ldap') { if (!$account->account_id && $GLOBALS['egw_info']['server']['auto_create_acct']) { // create a global array with all availible info about that account $GLOBALS['auto_create_acct'] = array(); foreach(array( 'givenname' => 'firstname', 'sn' => 'lastname', 'uidnumber' => 'account_id', 'mail' => 'email', ) as $ldap_name => $acct_name) { $GLOBALS['auto_create_acct'][$acct_name] = $GLOBALS['egw']->translation->convert($allValues[0][$ldap_name][0],'utf-8'); } // our group-ids are negative $GLOBALS['auto_create_acct']['primary_group'] = -$allValues[0]['gidnumber'][0]; return True; } return ($id = $GLOBALS['egw']->accounts->name2id($username,'account_lid','u')) && $GLOBALS['egw']->accounts->id2name($id,'account_status') == 'A'; } return True; } } // dn not found or password wrong return False; } /** * changes password in LDAP * * If $old_passwd is given, the password change is done binded as user and NOT with the * "root" dn given in the configurations. * * @param string $old_passwd must be cleartext or empty to not to be checked * @param string $new_passwd must be cleartext * @param int $account_id account id of user whose passwd should be changed * @return boolean true if password successful changed, false otherwise */ function change_password($old_passwd, $new_passwd, $account_id=0) { if (!$account_id) { $username = $GLOBALS['egw_info']['user']['account_lid']; } else { $username = $GLOBALS['egw']->translation->convert($GLOBALS['egw']->accounts->id2name($account_id), $GLOBALS['egw']->translation->charset(),'utf-8'); } //echo "

auth_ldap::change_password('$old_password','$new_passwd',$account_id) username='$username'

\n"; $filter = $GLOBALS['egw_info']['server']['ldap_search_filter'] ? $GLOBALS['egw_info']['server']['ldap_search_filter'] : '(uid=%user)'; $filter = str_replace(array('%user','%domain'),array($username,$GLOBALS['egw_info']['user']['domain']),$filter); $ds = $GLOBALS['egw']->common->ldapConnect(); $sri = ldap_search($ds, $GLOBALS['egw_info']['server']['ldap_context'], $filter); $allValues = ldap_get_entries($ds, $sri); $entry['userpassword'] = $this->encrypt_password($new_passwd); $dn = $allValues[0]['dn']; if($old_passwd) // if old password given (not called by admin) --> bind as that user to change the pw { $ds = $GLOBALS['egw']->common->ldapConnect('',$dn,$old_passwd); } if (!@ldap_modify($ds, $dn, $entry)) { return false; } if($old_passwd) // if old password given (not called by admin) update the password in the session { $GLOBALS['egw']->session->appsession('password','phpgwapi',$new_passwd); } return $entry['userpassword']; } }