mirror of
https://github.com/EGroupware/egroupware.git
synced 2024-12-16 19:50:44 +01:00
166 lines
5.8 KiB
PHP
166 lines
5.8 KiB
PHP
<?php
|
|
/**************************************************************************\
|
|
* eGroupWare API - Auth from LDAP *
|
|
* This file written by Lars Kneschke <lkneschke@linux-at-work.de> *
|
|
* and Joseph Engo <jengo@phpgroupware.org> *
|
|
* Authentication based on LDAP Server *
|
|
* Copyright (C) 2000, 2001 Joseph Engo *
|
|
* Copyright (C) 2002, 2003 Lars Kneschke *
|
|
* -------------------------------------------------------------------------*
|
|
* This library is part of the eGroupWare API *
|
|
* http://www.egroupware.org/api *
|
|
* ------------------------------------------------------------------------ *
|
|
* This library is free software; you can redistribute it and/or modify it *
|
|
* under the terms of the GNU Lesser General Public License as published by *
|
|
* the Free Software Foundation; either version 2.1 of the License, *
|
|
* or any later version. *
|
|
* This library is distributed in the hope that it will be useful, but *
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. *
|
|
* See the GNU Lesser General Public License for more details. *
|
|
* You should have received a copy of the GNU Lesser General Public License *
|
|
* along with this library; if not, write to the Free Software Foundation, *
|
|
* Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA *
|
|
\**************************************************************************/
|
|
|
|
/* $Id$ */
|
|
|
|
class auth_
|
|
{
|
|
var $previous_login = -1;
|
|
|
|
function authenticate($username, $passwd)
|
|
{
|
|
/*
|
|
error_reporting MUST be set to zero, otherwise you'll get nasty LDAP errors with a bad login/pass...
|
|
these are just "warnings" and can be ignored.....
|
|
*/
|
|
error_reporting(0);
|
|
|
|
if (ereg('[()|&=*,<>!~]',$username))
|
|
{
|
|
return False;
|
|
}
|
|
|
|
if(!$ldap = @ldap_connect($GLOBALS['phpgw_info']['server']['ldap_host']))
|
|
{
|
|
$GLOBALS['phpgw']->log->message('F-Abort, Failed connecting to LDAP server for authenication, execution stopped');
|
|
$GLOBALS['phpgw']->log->commit();
|
|
return False;
|
|
}
|
|
|
|
if($GLOBALS['phpgw_info']['server']['ldap_version3'])
|
|
{
|
|
ldap_set_option($ldap, LDAP_OPT_PROTOCOL_VERSION, 3);
|
|
}
|
|
|
|
/* Login with the LDAP Admin. User to find the User DN. */
|
|
if(!@ldap_bind($ldap, $GLOBALS['phpgw_info']['server']['ldap_root_dn'], $GLOBALS['phpgw_info']['server']['ldap_root_pw']))
|
|
{
|
|
return False;
|
|
}
|
|
/* find the dn for this uid, the uid is not always in the dn */
|
|
$attributes = array('uid', 'dn');
|
|
if ($GLOBALS['phpgw_info']['server']['account_repository'] == 'ldap')
|
|
{
|
|
$filter = "(&(uid=$username)(phpgwaccountstatus=A))";
|
|
}
|
|
else
|
|
{
|
|
$filter = "(uid=$username)";
|
|
}
|
|
$sri = ldap_search($ldap, $GLOBALS['phpgw_info']['server']['ldap_context'], $filter, $attributes);
|
|
$allValues = ldap_get_entries($ldap, $sri);
|
|
if ($allValues['count'] > 0)
|
|
{
|
|
if($GLOBALS['phpgw_info']['server']['case_sensitive_username'] == true)
|
|
{
|
|
if($allValues[0]['uid'][0] != $username)
|
|
{
|
|
return false;
|
|
}
|
|
}
|
|
/* we only care about the first dn */
|
|
$userDN = $allValues[0]['dn'];
|
|
/*
|
|
generate a bogus password to pass if the user doesn't give us one
|
|
this gets around systems that are anonymous search enabled
|
|
*/
|
|
if (empty($passwd))
|
|
{
|
|
$passwd = crypt(microtime());
|
|
}
|
|
/* try to bind as the user with user suplied password */
|
|
if (@ldap_bind($ldap, $userDN, $passwd))
|
|
{
|
|
if ($GLOBALS['phpgw_info']['server']['account_repository'] != 'ldap')
|
|
{
|
|
$account = CreateObject('phpgwapi.accounts',$username,'u');
|
|
$data = $account->read_repository();
|
|
return $data['status'] == 'A';
|
|
}
|
|
return True;
|
|
}
|
|
}
|
|
|
|
/* Turn error reporting back to normal */
|
|
error_reporting(7);
|
|
|
|
/* dn not found or password wrong */
|
|
return False;
|
|
}
|
|
|
|
function change_password($old_passwd, $new_passwd, $_account_id='')
|
|
{
|
|
if ('' == $_account_id)
|
|
{
|
|
$_account_id = $GLOBALS['phpgw_info']['user']['account_id'];
|
|
}
|
|
|
|
$ds = $GLOBALS['phpgw']->common->ldapConnect();
|
|
$sri = ldap_search($ds, $GLOBALS['phpgw_info']['server']['ldap_context'], 'uidnumber=' . (int)$_account_id);
|
|
$allValues = ldap_get_entries($ds, $sri);
|
|
|
|
$entry['userpassword'] = $this->encrypt_password($new_passwd);
|
|
$dn = $allValues[0]['dn'];
|
|
|
|
if (!@ldap_modify($ds, $dn, $entry))
|
|
{
|
|
return false;
|
|
}
|
|
$GLOBALS['phpgw']->session->appsession('password','phpgwapi',$new_passwd);
|
|
|
|
return $entry['userpassword'];
|
|
}
|
|
|
|
/* This data needs to be updated in LDAP, not SQL (jengo) */
|
|
function old_update_lastlogin($account_id, $ip)
|
|
{
|
|
$GLOBALS['phpgw']->db->query("SELECT account_lastlogin FROM phpgw_accounts WHERE account_id='$account_id'",__LINE__,__FILE__);
|
|
$GLOBALS['phpgw']->db->next_record();
|
|
$this->previous_login = $GLOBALS['phpgw']->db->f('account_lastlogin');
|
|
|
|
$now = time();
|
|
|
|
$GLOBALS['phpgw']->db->query("UPDATE phpgw_accounts SET account_lastloginfrom='"
|
|
. "$ip', account_lastlogin='" . $now
|
|
. "' WHERE account_id='$account_id'",__LINE__,__FILE__);
|
|
}
|
|
|
|
function update_lastlogin($_account_id, $ip)
|
|
{
|
|
$entry['phpgwaccountlastlogin'] = time();
|
|
$entry['phpgwaccountlastloginfrom'] = $ip;
|
|
|
|
$ds = $GLOBALS['phpgw']->common->ldapConnect();
|
|
$sri = ldap_search($ds, $GLOBALS['phpgw_info']['server']['ldap_context'], 'uidnumber=' . (int)$_account_id);
|
|
$allValues = ldap_get_entries($ds, $sri);
|
|
|
|
$dn = $allValues[0]['dn'];
|
|
$this->previous_login = $allValues[0]['phpgwaccountlastlogin'][0];
|
|
|
|
@ldap_modify($ds, $dn, $entry);
|
|
}
|
|
}
|
|
?>
|