Add sample external authentication plugin (ldap)
This commit is contained in:
parent
2e19af4b1e
commit
fd9b506c2f
4 changed files with 152 additions and 16 deletions
|
@ -52,6 +52,8 @@ Current hooks:
|
||||||
'username' => the supplied username
|
'username' => the supplied username
|
||||||
'password' => the supplied password
|
'password' => the supplied password
|
||||||
'authenticated' => set this to non-zero to authenticate the user.
|
'authenticated' => set this to non-zero to authenticate the user.
|
||||||
|
'user_record' => successful authentication must also return a valid user record from the database
|
||||||
|
|
||||||
|
|
||||||
'logged_in' - called after a user has successfully logged in.
|
'logged_in' - called after a user has successfully logged in.
|
||||||
$b contains the $a->user array
|
$b contains the $a->user array
|
||||||
|
|
124
addon/ldapauth.php
Normal file
124
addon/ldapauth.php
Normal file
|
@ -0,0 +1,124 @@
|
||||||
|
<?php
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Friendika addon
|
||||||
|
*
|
||||||
|
* Module: LDAP Authenticate
|
||||||
|
*
|
||||||
|
* Authenticate a user against an LDAP directory
|
||||||
|
* Useful for Windows Active Directory and other LDAP-based organisations
|
||||||
|
* to maintain a single password across the organisation.
|
||||||
|
*
|
||||||
|
* Optionally authenticates only if a member of a given group in the directory.
|
||||||
|
*
|
||||||
|
* The person must have registered with Friendika using the normal registration
|
||||||
|
* procedures in order to have a Friendika user record, contact, and profile.
|
||||||
|
*
|
||||||
|
* Note when using with Windows Active Directory: you may need to set TLS_CACERT in your site
|
||||||
|
* ldap.conf file to the signing cert for your LDAP server.
|
||||||
|
*
|
||||||
|
* The required configuration options for this module may be set in the .htconfig.php file
|
||||||
|
* e.g.:
|
||||||
|
*
|
||||||
|
* $a->config['ldapauth']['ldap_server'] = 'host.example.com';
|
||||||
|
* ...etc.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
function ldapauth_install() {
|
||||||
|
register_hook('authenticate', 'addon/ldapauth/ldapauth.php', 'ldapauth_hook_authenticate');
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
function ldapauth_uninstall() {
|
||||||
|
unregister_hook('authenticate', 'addon/ldapauth/ldapauth.php', 'ldapauth_hook_authenticate');
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
function ldapauth_hook_authenticate($a,&$b) {
|
||||||
|
if(ldapauth_authenticate($b['username'],$b['password'])) {
|
||||||
|
$results = q("SELECT * FROM `user` WHERE `nickname` = '%s' AND `blocked` = 0 AND `verified` = 1 LIMIT 1",
|
||||||
|
dbesc($b['username'])
|
||||||
|
);
|
||||||
|
if(count($results)) {
|
||||||
|
$b['user_record'] = $results[0];
|
||||||
|
$b['authenticated'] = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
function ldapauth_authenticate($username,$password) {
|
||||||
|
|
||||||
|
$ldap_server = get_config('ldapauth','ldap_server');
|
||||||
|
$ldap_binddn = get_config('ldapauth','ldap_binddn');
|
||||||
|
$ldap_bindpw = get_config('ldapauth','ldap_bindpw');
|
||||||
|
$ldap_searchdn = get_config('ldapauth','ldap_searchdn');
|
||||||
|
$ldap_userattr = get_config('ldapauth','ldap_userattr');
|
||||||
|
$ldap_group = get_config('ldapauth','ldap_group');
|
||||||
|
|
||||||
|
if(! ((strlen($password))
|
||||||
|
&& (function_exists('ldap_connect'))
|
||||||
|
&& (strlen($ldap_server))))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
$connect = @ldap_connect($ldap_server);
|
||||||
|
|
||||||
|
if(! $connect)
|
||||||
|
return false;
|
||||||
|
|
||||||
|
@ldap_set_option($connect, LDAP_OPT_PROTOCOL_VERSION,3);
|
||||||
|
@ldap_set_option($connect, LDAP_OPT_REFERRALS, 0);
|
||||||
|
if((@ldap_bind($connect,$ldap_binddn,$ldap_bindpw)) === false) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
$res = @ldap_search($connect,$ldap_searchdn, $ldap_userattr . '=' . $username);
|
||||||
|
|
||||||
|
if(! $res) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
$id = @ldap_first_entry($connect,$res);
|
||||||
|
|
||||||
|
if(! $id) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
$dn = @ldap_get_dn($connect,$id);
|
||||||
|
|
||||||
|
if(! @ldap_bind($connect,$dn,$password))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
if(! strlen($ldap_group))
|
||||||
|
return true;
|
||||||
|
|
||||||
|
$r = @ldap_compare($connect,$ldap_group,'member',$dn);
|
||||||
|
if ($r === -1) {
|
||||||
|
$err = @ldap_error($connect);
|
||||||
|
$eno = @ldap_errno($connect);
|
||||||
|
@ldap_close($connect);
|
||||||
|
|
||||||
|
if ($eno === 32) {
|
||||||
|
logger("ldapauth: access control group Does Not Exist");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
elseif ($eno === 16) {
|
||||||
|
logger('ldapauth: membership attribute does not exist in access control group');
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
logger('ldapauth: error: ' . $err);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
elseif ($r === false) {
|
||||||
|
@ldap_close($connect);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
|
@ -110,7 +110,7 @@ function randplace_post_hook($a, &$item) {
|
||||||
$cities = array();
|
$cities = array();
|
||||||
$zones = timezone_identifiers_list();
|
$zones = timezone_identifiers_list();
|
||||||
foreach($zones as $zone) {
|
foreach($zones as $zone) {
|
||||||
if(strpos($zone,'/'))
|
if((strpos($zone,'/')) && (! stristr($zone,'US/')) && (! stristr($zone,'Etc/')))
|
||||||
$cities[] = str_replace('_', ' ',substr($zone,strpos($zone,'/') + 1));
|
$cities[] = str_replace('_', ' ',substr($zone,strpos($zone,'/') + 1));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -132,16 +132,18 @@ else {
|
||||||
}
|
}
|
||||||
if((x($_POST,'auth-params')) && $_POST['auth-params'] === 'login') {
|
if((x($_POST,'auth-params')) && $_POST['auth-params'] === 'login') {
|
||||||
|
|
||||||
|
$record = null;
|
||||||
|
|
||||||
$addon_auth = array(
|
$addon_auth = array(
|
||||||
'name' => trim($_POST['openid_url']),
|
'username' => trim($_POST['openid_url']),
|
||||||
'password' => trim($_POST['password']),
|
'password' => trim($_POST['password']),
|
||||||
'authenticated' => 0
|
'authenticated' => 0,
|
||||||
|
'user_record' => null
|
||||||
);
|
);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
* A plugin indicates successful login by setting 'authenticated' to non-zero value
|
* A plugin indicates successful login by setting 'authenticated' to non-zero value and returning a user record
|
||||||
* Plugins should never set 'authenticated' except to indicate success - as hooks may be chained
|
* Plugins should never set 'authenticated' except to indicate success - as hooks may be chained
|
||||||
* and later plugins should not interfere with an earlier one that succeeded.
|
* and later plugins should not interfere with an earlier one that succeeded.
|
||||||
*
|
*
|
||||||
|
@ -149,8 +151,12 @@ else {
|
||||||
|
|
||||||
call_hooks('authenticate', $addon_auth);
|
call_hooks('authenticate', $addon_auth);
|
||||||
|
|
||||||
if(! $addon_auth['authenticated']) {
|
if(($addon_auth['authenticated']) && (count($addon_auth['user_record']))) {
|
||||||
// process login request
|
$record = $addon_auth['user_record'];
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
|
||||||
|
// process normal login request
|
||||||
|
|
||||||
$r = q("SELECT * FROM `user` WHERE ( `email` = '%s' OR `nickname` = '%s' )
|
$r = q("SELECT * FROM `user` WHERE ( `email` = '%s' OR `nickname` = '%s' )
|
||||||
AND `password` = '%s' AND `blocked` = 0 AND `verified` = 1 LIMIT 1",
|
AND `password` = '%s' AND `blocked` = 0 AND `verified` = 1 LIMIT 1",
|
||||||
|
@ -158,21 +164,25 @@ else {
|
||||||
dbesc(trim($_POST['openid_url'])),
|
dbesc(trim($_POST['openid_url'])),
|
||||||
dbesc($encrypted)
|
dbesc($encrypted)
|
||||||
);
|
);
|
||||||
if(($r === false) || (! count($r))) {
|
if(count($r))
|
||||||
notice( t('Login failed.') . EOL );
|
$record = $r[0];
|
||||||
goaway($a->get_baseurl());
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
$_SESSION['uid'] = $r[0]['uid'];
|
if((! $record) || (! count($record))) {
|
||||||
$_SESSION['theme'] = $r[0]['theme'];
|
logger('authenticate: failed login attempt: ' . trim($_POST['openid_url']));
|
||||||
|
notice( t('Login failed.') . EOL );
|
||||||
|
goaway($a->get_baseurl());
|
||||||
|
}
|
||||||
|
|
||||||
|
$_SESSION['uid'] = $record['uid'];
|
||||||
|
$_SESSION['theme'] = $record['theme'];
|
||||||
$_SESSION['authenticated'] = 1;
|
$_SESSION['authenticated'] = 1;
|
||||||
$_SESSION['page_flags'] = $r[0]['page-flags'];
|
$_SESSION['page_flags'] = $record['page-flags'];
|
||||||
$_SESSION['my_url'] = $a->get_baseurl() . '/profile/' . $r[0]['nickname'];
|
$_SESSION['my_url'] = $a->get_baseurl() . '/profile/' . $record['nickname'];
|
||||||
$_SESSION['addr'] = $_SERVER['REMOTE_ADDR'];
|
$_SESSION['addr'] = $_SERVER['REMOTE_ADDR'];
|
||||||
|
|
||||||
notice( t("Welcome back ") . $r[0]['username'] . EOL);
|
notice( t("Welcome back ") . $record['username'] . EOL);
|
||||||
$a->user = $r[0];
|
$a->user = $record;
|
||||||
if(strlen($a->user['timezone']))
|
if(strlen($a->user['timezone']))
|
||||||
date_default_timezone_set($a->user['timezone']);
|
date_default_timezone_set($a->user['timezone']);
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue