diff --git a/lam-web/documentation/LAMPro-HowTo/ch01.html b/lam-web/documentation/LAMPro-HowTo/ch01.html new file mode 100644 index 00000000..749fa33a --- /dev/null +++ b/lam-web/documentation/LAMPro-HowTo/ch01.html @@ -0,0 +1,10 @@ +
Table of Contents
By default only a few administrative users have write access to + the LDAP database. Before your users may change their settings you + must allow them to change their LDAP data.
This can be done by adding an ACL to your slapd.conf which looks + like this:
access to
+ attrs=mail,sn,givenName,telephoneNumber,mobile,facsimileTelephoneNumber,street,postalAddress,postOfficeBox,postalCode,password
by self write
If you do not want them to change all attributes then reduce the + list to fit your needs. Some modules may require additional LDAP + attributes.
Usually, the slapd.conf file is located in /etc/ldap or + /etc/openldap.
A self service profile defines what input fields your users see + and some other general settings like the login caption.
When you go to the LAM configuration page you will see the self + service link at the bottom. This will lead you to the self service + configuration pages
Now we need to create a new self service profile. Click on the + link to manage the self service profiles.
Specify a name for the new profile and enter you master + configuration password (default is "lam") to save the profile.
Now go back to the profile login and enter your master + configuration password to edit your new profile.
On top of the page you see the link to the user login page. Copy + this link address and give it to your users.
Below the link you can specify several options.
Table 1.1. General options
Server address | The address of your LDAP server |
LDAP suffix | The part of the LDAP tree where LAM should search for + users |
LDAP user + password | The DN and password which is used to search for users in + the LDAP database. It is sufficient if this DN has only read + rights. If you leave these fields empty LAM will try to connect + anonymously. |
LDAP search attribute | Here you can specify if your users can login with user + name + password, email + password or other attributes. |
Login attribute label | This is the description for the LDAP search attribute. + Set it to something which your users are familiar with. |
Login caption | This text is displayed at the login page. You can input + HTML, too. |
Main page caption | This text is displayed at self service main page where + your users change their data. You can input HTML, too. |
On the bottom you can specify what input fields your users can + see. It is also possible to group several input fields.
Table of Contents
LAM Pro provides some more account modules to support additional + LDAP object classes.
Currently these are:
groupOfNames
groupOfUniqueNames
These classes can be used to represent group relations. Since they + allow DNs as members you can also use them to represent nested + groups.
Group of (unique) names have four basic attributes:
Name: a unique name for the group
Description: optional description
Owner: the account which owns this group (optional)
Members: the members of the group (at least one is + required)
You can add any accounts as members. This includes other groups + which leads to nested groups.
Table of Contents
List of Tables