2355 lines
80 KiB
XML
2355 lines
80 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE book PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
|
|
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd">
|
|
<chapter id="a_configuration">
|
|
<title>Configuration</title>
|
|
|
|
<para>After you <link linkend="a_installation">installed</link> LAM you can
|
|
configure it to fit your needs. The complete configuration can be done
|
|
inside the application. There is no need to edit configuration files.</para>
|
|
|
|
<para>Please point you browser to the location where you installed LAM. E.g.
|
|
for Debian/RPM this is http://yourServer/lam. If you installed LAM via the
|
|
tar.bz2 then this may vary. You should see the following page:</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/login.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>If you see an error message then you might need to install an
|
|
additional PHP extension. Please follow the instructions and reload the page
|
|
afterwards.</para>
|
|
|
|
<para>Now you are ready to configure LAM. Click on the "LAM configuration"
|
|
link to proceed.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configOverview.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>Here you can change LAM's general settings, setup server profiles for
|
|
your LDAP server(s) and configure the <link linkend="a_selfService">self
|
|
service</link> (LAM Pro). You should start with the general settings and
|
|
then setup a server profile.</para>
|
|
|
|
<section id="generalSettings">
|
|
<title>General settings</title>
|
|
|
|
<para>After selecting "Edit general settings" you will need to enter the
|
|
<link linkend="a_configPasswords">master configuration password</link>.
|
|
The default password for new installations is "lam". Now you can edit the
|
|
general settings.</para>
|
|
|
|
<section>
|
|
<title>License (LAM Pro only)</title>
|
|
|
|
<para>This is only required when you run LAM Pro. Please enter the
|
|
license key from your <ulink
|
|
url="https://www.ldap-account-manager.org/lamcms/user/me">customer
|
|
profile</ulink>. In case you have purchased multiple licenses please
|
|
only enter one license key block per installation.</para>
|
|
|
|
<para>When you entered the license key then the license details can be
|
|
seen on LAM configuration overview page.</para>
|
|
|
|
<para>By default, LAM Pro will show a warning message on the login page
|
|
3 weeks before expiration. You can disable this here and/or send out an
|
|
email instead.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral7.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Security settings</title>
|
|
|
|
<para>Here you can set a time period after which inactive sessions are
|
|
automatically invalidated. The selected value represents minutes of
|
|
inactivity.</para>
|
|
|
|
<para>You may also set a list of IP addresses which are allowed to
|
|
access LAM. The IPs can be specified as full IP (e.g. 123.123.123.123)
|
|
or with the "*" wildcard (e.g. 123.123.123.*). Users which try to access
|
|
LAM via an untrusted IP only get blank pages. There is a separate field
|
|
for LAM Pro self service.</para>
|
|
|
|
<para id="sessionEncryption">Session encryption will encrypt sensitive
|
|
data like passwords in your session files. This is only available when
|
|
PHP <ulink
|
|
url="http://php.net/manual/en/book.openssl.php">OpenSSL</ulink> is
|
|
active. This adds extra security but also costs performance. If you
|
|
manage a large directory you might want to disable this and take other
|
|
actions to secure your LAM server.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para id="conf_sslCert"><emphasis role="bold">SSL certificate
|
|
setup:</emphasis></para>
|
|
|
|
<para>By default, LAM uses the CA certificates that are preinstalled on
|
|
your system. This will work if you connect via SSL/TLS to an LDAP server
|
|
that uses a certificate signed by a well-known CA. In case you use your
|
|
own CA (e.g. company internal CA) you can import the CA certificates
|
|
here.</para>
|
|
|
|
<para>Please note that this can affect other web applications on the
|
|
same server if they require different certificates. There seem to be
|
|
problems on Debian systems and you may also need to restart Apache. In
|
|
case of any problems please delete the uploaded certificates and use the
|
|
<link linkend="ssl_certSystem">system setup</link>.</para>
|
|
|
|
<para>You can either upload a DER/PEM formatted certificate file or
|
|
import the certificates directly from an LDAP server that is available
|
|
with LDAP+SSL (ldaps://). LAM will automatically override system
|
|
certificates if at least one certificate is uploaded/imported.</para>
|
|
|
|
<para>The whole certificate list can be downloaded in PEM format. You
|
|
can also delete single certificates from the list.</para>
|
|
|
|
<para>Please note that you might need to restart your webserver if you
|
|
do any changes to this configuration.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral4.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Password policy</title>
|
|
|
|
<para>This allows you to specify a central password policy for LAM. The
|
|
policy is valid for all password fields inside LAM admin (excluding tree
|
|
view) and LAM self service. Configuration passwords do not need to
|
|
follow this policy.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral2.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>You can set the minimum password length and also the complexity of
|
|
the passwords.</para>
|
|
|
|
<para><emphasis role="bold">External password check</emphasis></para>
|
|
|
|
<para>Please note that this option is only displayed if you have
|
|
installed the PHP Curl extension for your web server.</para>
|
|
|
|
<para>This will validate passwords using an external service. LAM
|
|
supports the protocol used by <ulink
|
|
url="https://haveibeenpwned.com/API/v2#SearchingPwnedPasswordsByRange">Have
|
|
I been Pwned</ulink>. You can use the service directly or setup any
|
|
custom service with the same API. If the service reports an error LAM
|
|
will log an error message and the password will be accepted.</para>
|
|
|
|
<para>Example URL:
|
|
https://api.pwnedpasswords.com/range/{SHA1PREFIX}</para>
|
|
|
|
<para>LAM will build a SHA1 hash of the password and send parts of it to
|
|
the service.</para>
|
|
|
|
<para>The configured URL must contain the wildcard "{SHA1PREFIX}" which
|
|
will be replaced with the 5 character hash prefix. The service must then
|
|
return a list of text lines in the format "<hash
|
|
suffix>:<number>".</para>
|
|
|
|
<para>"<hash suffix>" needs to be the suffix of a known insecure
|
|
password. The "<number>" can be any numeric value and will be
|
|
ignored by LAM.</para>
|
|
|
|
<para>Example:</para>
|
|
|
|
<para>Password hash: 21BD10018A45C4D1DEF81644B54AB7F969B88D65</para>
|
|
|
|
<para>Hash prefix sent to service: 21BD1</para>
|
|
|
|
<para>Returned line: 0018A45C4D1DEF81644B54AB7F969B88D65:1</para>
|
|
|
|
<para>This will reject the password.</para>
|
|
</section>
|
|
|
|
<section id="conf_logging">
|
|
<title>Logging</title>
|
|
|
|
<para>LAM can log events (e.g. user logins). You can use e.g. system
|
|
logging (syslog for Unix, event viewer for Windows) or log to a separate
|
|
file. Please note that LAM may log sensitive data (e.g. passwords) at
|
|
log level "Debug". Production systems should be set to "Warning" or
|
|
"Error".</para>
|
|
|
|
<para>The PHP error reporting is only for developers. By default LAM
|
|
does not show PHP notice messages in the web pages. You can select to
|
|
use the php.ini setting here or printing all errors and notices.</para>
|
|
|
|
<para>Log destinations:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>File: all messages will be written to the given file. LAM will
|
|
create it if not yet existing.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Syslog: uses local system logging (syslog for Unix, event
|
|
viewer for Windows)</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Remote: sends log messages to a remote server that supports
|
|
the Unix <ulink url="https://www.rsyslog.com/">remote
|
|
Syslogd</ulink> protocol. Please enter destination as "server:port",
|
|
e.g. "myserver:123".</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>No logging: disabled logging</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral3.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
|
|
<section id="mailSetup">
|
|
<title>Mail options (LAM Pro)</title>
|
|
|
|
<para>Here you can configure the mail server settings. If you do not set
|
|
a mail server then LAM will try to use a locally installed one (e.g.
|
|
postfix, exim, sendmail).</para>
|
|
|
|
<para>SMTP setup:</para>
|
|
|
|
<para>Mail server: enter name + port separated by ":". E.g. "server:25"
|
|
will use "server" on port 25. Please note that your mail server
|
|
<emphasis role="bold">must</emphasis> support TLS encryption.</para>
|
|
|
|
<para>User name: enter the user name if your SMTP server requires
|
|
authentication</para>
|
|
|
|
<para>Password: enter the password for the user above</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral6.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
|
|
<section id="confmain_webauthn">
|
|
<title>Webauthn/FIDO2 devices</title>
|
|
|
|
<para>See the <link linkend="a_webauthn">Webauthn/FIDO2 appendix</link>
|
|
for an overview about Webauthn/FIDO2 in LAM.</para>
|
|
|
|
<para>Here you can delete any webauthn device registrations. This
|
|
section is only shown if at least one device is registered.</para>
|
|
|
|
<para>Enter a part of the user's DN in the input box and perform a
|
|
search. LAM will show users and devices that match the search. You can
|
|
then delete a device registration. If the user has no more registered
|
|
devices then LAM will ask for registration on next login.</para>
|
|
|
|
<para>Note: You cannot add any device here. This can only be done by the
|
|
user during login, <link linkend="tool_webauthn">webauthn tool</link> or
|
|
self service.</para>
|
|
|
|
<para><screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral8.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot></para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Change master password</title>
|
|
|
|
<para>If you would like to change the master configuration password then
|
|
enter a new password here.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configGeneral5.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
</section>
|
|
|
|
<section id="serverProfiles">
|
|
<title>Server profiles</title>
|
|
|
|
<para>The server profiles store information about your LDAP server (e.g.
|
|
host name) and what kind of accounts (e.g. users and groups) you would
|
|
like to manage. There is no limit on the number of server profiles. See
|
|
the <link linkend="confTypicalScenarios">typical scenarios</link> about
|
|
how to structure your server profiles.</para>
|
|
|
|
<section>
|
|
<title>Manage server profiles</title>
|
|
|
|
<para>Select "Manage server profiles" to open the profile management
|
|
page.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>Here you can create, rename and delete server profiles. The <link
|
|
linkend="a_configPasswords">passwords</link> of your server profiles can
|
|
also be reset.</para>
|
|
|
|
<para>You may also specify the default server profile. This is the
|
|
server profile which is preselected at the login page. It also specifies
|
|
the language of the login and configuration pages.</para>
|
|
|
|
<para><emphasis role="bold">Templates for new server
|
|
profiles</emphasis></para>
|
|
|
|
<para>You can create a new server profile based on one of the built-in
|
|
templates or any existing profile. Of course, the account types and
|
|
selected modules can be changed after you created your profile.</para>
|
|
|
|
<para>Built-in templates:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>addressbook: simple profile for user management with
|
|
inetOrgPerson object class</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>samba3: Samba 3 users, groups, hosts and domains</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>unix: Unix users and groups (posixAccount/Group)</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>windows_samba4: Active Directory user, group and host
|
|
management</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles2.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>All operations on the profile management page require that you
|
|
authenticate yourself with the <link
|
|
linkend="a_configPasswords">configuration master password</link>.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Editing a server profile</title>
|
|
|
|
<para>Please select you server profile and enter its password to edit a
|
|
server profile.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles3.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>Each server profile contains the following information:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><emphasis role="bold">General settings:</emphasis> general
|
|
settings about your LDAP server (e.g. host name and security
|
|
settings)</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Account types:</emphasis> list of
|
|
account types (e.g. users and groups) that you would like to manage
|
|
and type specific settings (e.g. LDAP suffix)</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Modules:</emphasis> list of modules
|
|
which define what account aspects (e.g. Unix, Samba, Kolab) you
|
|
would like to manage</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Module settings:</emphasis> settings
|
|
which are specific for the selected account modules on the page
|
|
before</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<section id="general_settings">
|
|
<title>General settings</title>
|
|
|
|
<para>Here you can specify the LDAP server and some security
|
|
settings.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles4.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>The server address of your LDAP server can be a DNS name or an
|
|
IP address. Use ldap:// for unencrypted LDAP connections or TLS
|
|
encrypted connections. LDAP+SSL (LDAPS) encrypted connections are
|
|
specified with ldaps://. The port value is optional. TLS cannot be
|
|
combined with ldaps://.</para>
|
|
|
|
<para>Hint: If you use a master/slave setup with referrals then point
|
|
LAM to your master server. Due to bugs in the underlying LDAP
|
|
libraries pointing to a slave might cause issues on write
|
|
operations.</para>
|
|
|
|
<para>LAM includes an LDAP browser which allows direct modification of
|
|
LDAP entries. If you would like to use it then enter the LDAP suffix
|
|
at "Tree suffix".</para>
|
|
|
|
<para>The search limit is used to reduce the number of search results
|
|
which are returned by your LDAP server.</para>
|
|
|
|
<para>The access level specifies if LAM should allow to modify LDAP
|
|
entries. This feature is only available in LAM Pro. LAM non-Pro
|
|
releases use write access. See <link
|
|
linkend="a_accessLevelPasswordReset">this page</link> for details on
|
|
the different access levels.</para>
|
|
|
|
<para><emphasis role="bold">Advanced options</emphasis></para>
|
|
|
|
<para>Display name: Sometimes, you may not want to display the server
|
|
address on the login page. In this case you can setup a display name
|
|
here (e.g. "Production").</para>
|
|
|
|
<para>Follow referrals: By default LAM will not follow LDAP referrals.
|
|
This is ok for most installations. If you use LDAP referrals please
|
|
activate the referral option in advanced settings.</para>
|
|
|
|
<para>Paged results: Paged results should be activated only if you
|
|
encounter any problems regarding size limits on Active Directory. LAM
|
|
will then query LDAP to return results in chunks of 999
|
|
entries.</para>
|
|
|
|
<para>Referential integrity overlay: Activate this checkbox if you
|
|
have any server side extension for referential integrity in place. In
|
|
this case the server will cleanup references to LDAP entries that are
|
|
deleted.</para>
|
|
|
|
<para>The following actions are skipped in this case:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>Users: group of (unique) names: memberships are not deleted
|
|
when user is deleted</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Users: organizational roles: role assignments are not
|
|
deleted when user is deleted</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Groups: groupOf(Unique)Names: memberships are not deleted
|
|
when group is deleted</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<para>Hide password prompt for expired password: Hides the password
|
|
prompt when a user with expired password logs into LAM.</para>
|
|
|
|
<literallayout>
|
|
</literallayout>
|
|
|
|
<para>LAM is translated to many different languages. Here you can
|
|
select the default language for this server profile. The language
|
|
setting may be overridden at the LAM login page.</para>
|
|
|
|
<para>Please also set your time zone here.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles5.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>LAM can manage user home directories and quotas with an external
|
|
script. You can specify the home directory server and where the script
|
|
is located. The default rights for new home directories can be set,
|
|
too.</para>
|
|
|
|
<para><emphasis role="bold">Note:</emphasis> This requires lamdaemon
|
|
to be installed on the remote server. This comes as separate package
|
|
for DEB/RPM. See <link linkend="a_lamdaemon">here</link>.</para>
|
|
|
|
<para>Script server format:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>"server": "server" is the DNS name of your script
|
|
server</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>"server:NAME": NAME is the display name of this
|
|
server</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>"server:NAME:/prefix": /prefix is the directory prefix for
|
|
all operations. E.g. creating a home directory "/home/user" would
|
|
create "/prefix/home/user" then.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<para>You can provide a fixed user name. If you leave the field empty
|
|
then LAM will use your current account (the account you used to login
|
|
to LAM).</para>
|
|
|
|
<para>There are two possibilities to connect to your home
|
|
directory/quota server:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>SSH key (recommended): Please generate a SSH key pair and
|
|
provide the location to the <emphasis
|
|
role="bold">private</emphasis> key file. If the key is protected
|
|
by a password you can also specify it here. Please note that only
|
|
RSA keys (with "-----BEGIN RSA PRIVATE KEY-----" at the beginning
|
|
of the file) are supported.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Password: If you do not set a SSH key then LAM will try to
|
|
connect with your current account (the password you used to login
|
|
to LAM).</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles6.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para id="profile_mail">LAM Pro users may directly set passwords from
|
|
list view. You can configure if it should be possible to set specific
|
|
passwords and showing password on screen is allowed.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles10.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>LAM Pro users can send out changed passwords to their users.
|
|
Here you can specify the options for these mails.</para>
|
|
|
|
<para>If you select "Allow alternate address" then password mails can
|
|
be sent to any address (e.g. a secondary address if the user account
|
|
is also bound to the mailbox).</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles9.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>LAM supports two methods for login:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>Fixed list</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>LDAP search</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles8.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>The first one is to specify a fixed list of LDAP DNs that are
|
|
allowed to login. Please enter one DN per line.</para>
|
|
|
|
<para>The second one is to let LAM search for the DN in your
|
|
directory. E.g. if a user logs in with the user name "joe" then LAM
|
|
will do an LDAP search for this user name. When it finds a matching DN
|
|
then it will use this to authenticate the user. The wildcard "%USER%"
|
|
will be replaced by "joe" in this example. This way you can provide
|
|
login by user name, email address or other LDAP attributes.</para>
|
|
|
|
<para>Additionally, you can enable HTTP authentication when using
|
|
"LDAP search". This way the web server is responsible to authenticate
|
|
your users. LAM will use the given user name + password for the LDAP
|
|
login. You can also configure this to setup advanced login
|
|
restrictions (e.g. require group memberships for login). To setup HTTP
|
|
authentication in Apache please see this <ulink
|
|
url="http://httpd.apache.org/docs/2.2/howto/auth.html">link</ulink>
|
|
and an example for LDAP authentication <link lang=""
|
|
linkend="apache_http_auth">here</link>.</para>
|
|
|
|
<para><emphasis role="bold">Hint:</emphasis> LDAP search with group
|
|
membership check can be done with either <link
|
|
linkend="apache_http_auth">HTTP authentication</link> or LDAP overlays
|
|
like <ulink
|
|
url="http://www.openldap.org/doc/admin24/overlays.html">"memberOf"</ulink>
|
|
or <ulink
|
|
url="http://www.openldap.org/doc/admin24/overlays.html">"Dynamic
|
|
lists"</ulink>. Dynamic lists allow to insert virtual attributes to
|
|
your user entries. These can then be used for the LDAP filter (e.g.
|
|
"(&(uid=%USER%)(memberof=cn=admins,ou=groups,dc=company,dc=com))").</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles7.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para id="conf_serverprofile_2fa"><emphasis role="bold">2-factor
|
|
authentication</emphasis></para>
|
|
|
|
<para>LAM supports 2-factor authentication for your users. This means
|
|
the user will not only authenticate by user+password but also with
|
|
e.g. a token generated by a mobile device. This adds more security
|
|
because the token is generated on a physically separated device
|
|
(typically mobile phone).</para>
|
|
|
|
<para>The token is validated by a second application. LAM currently
|
|
supports:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><ulink
|
|
url="https://www.privacyidea.org/">privacyIdea</ulink></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><ulink url="https://www.yubico.com/">YubiKey</ulink></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><ulink url="https://duo.com/">Duo</ulink></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><ulink
|
|
url="https://webauthn.io/">Webauthn/FIDO2</ulink></para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<para>Configuration options:</para>
|
|
|
|
<para><emphasis role="bold">privacyIDEA</emphasis></para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>Base URL: please enter the URL of your privacyIDEA
|
|
instance</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>User name attribute: please enter the LDAP attribute name
|
|
that contains the user ID (e.g. "uid").</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Optional: By default LAM will enforce to use a token and
|
|
reject users that did not setup one. You can set this check to
|
|
optional. But if a user has setup a token then this will always be
|
|
required.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Disable certificate check: This should be used on
|
|
development instances only. It skips the certificate check when
|
|
connecting to verification server.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<para><emphasis role="bold">YubiKey</emphasis></para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>Base URLs: please enter the URL(s) of your YubiKey
|
|
verification server(s). If you run a custom verification API such
|
|
as yubiserver then enter its URL (e.g.
|
|
http://www.example.com:8000/wsapi/2.0/verify). The URL needs to
|
|
end with "/wsapi/2.0/verify". For YubiKey cloud these are
|
|
"https://api.yubico.com/wsapi/2.0/verify",
|
|
"https://api2.yubico.com/wsapi/2.0/verify",
|
|
"https://api3.yubico.com/wsapi/2.0/verify",
|
|
"https://api4.yubico.com/wsapi/2.0/verify" and
|
|
"https://api5.yubico.com/wsapi/2.0/verify". Enter one URL per
|
|
line.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Client id: this is only required for YubiKey cloud. You can
|
|
register here: https://upgrade.yubico.com/getapikey/</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Secret key: this is only required for YubiKey cloud. You can
|
|
register here: https://upgrade.yubico.com/getapikey/</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Optional: By default LAM will enforce to use a token and
|
|
reject users that did not setup one. You can set this check to
|
|
optional. But if a user has setup a token then this will always be
|
|
required.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Disable certificate check: This should be used on
|
|
development instances only. It skips the certificate check when
|
|
connecting to verification server.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<para><emphasis role="bold">Duo</emphasis></para>
|
|
|
|
<para>This requires to register a new "Web SDK" application in your
|
|
Duo admin panel.</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>User name attribute: please enter the LDAP attribute name
|
|
that contains the user ID (e.g. "uid").</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Base URL: please enter the API-URL of your Duo instance
|
|
(e.g. api-12345.duosecurity.com).</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Client id: please enter your integration key.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Secret key: please enter your secret key.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<para><emphasis role="bold">Webauthn/FIDO2</emphasis></para>
|
|
|
|
<para>See the <link linkend="a_webauthn">Webauthn/FIDO2
|
|
appendix</link> for an overview about Webauthn/FIDO2 in LAM.</para>
|
|
|
|
<para>Users will be asked to register a device during login if no
|
|
device is setup.</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>Domain: Please enter the WebAuthn domain. This is the public
|
|
domain of the web server (e.g. "example.com"). Do not include
|
|
protocol or port. Browsers will reject authentication if the
|
|
domain does not match the web server domain.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Optional: By default LAM will enforce to use a 2FA device
|
|
and reject users that do not setup one. You can set this check to
|
|
optional. But if a user has setup a device then this will always
|
|
be required.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles11.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>After logging in with user + password LAM will ask for the 2nd
|
|
factor. If the user has setup multiple factors then he can choose one
|
|
of them.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles12.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para><emphasis role="bold">Password</emphasis></para>
|
|
|
|
<para>You may also change the password of this server profile. Please
|
|
just enter the new password in both password fields.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configProfiles13.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Account types</title>
|
|
|
|
<para>LAM supports to manage various types of LDAP entries (e.g.
|
|
users, groups, DHCP entries, ...). On this page you can select which
|
|
types of entries you want to manage with LAM.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configTypes1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>The section at the top shows a list of possible types. You can
|
|
activate them by simply clicking on the plus sign next to it.</para>
|
|
|
|
<para>Each account type has the following options:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><emphasis role="bold">LDAP suffix:</emphasis> the LDAP
|
|
suffix where entries of this type should be managed</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">List attributes:</emphasis> a list of
|
|
attributes which are shown in the account lists</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Additional LDAP filter:</emphasis> LAM
|
|
will automatically detect the right LDAP entries for each account
|
|
type. This can be used to further limit the number of visible
|
|
entries (e.g. if you want to manage only some specific groups).
|
|
You can use "@@LOGIN_DN@@" as wildcard (e.g.
|
|
"(owner=@@LOGIN_DN@@)"). It will be replaced by the DN of the user
|
|
who is logged in.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Hidden:</emphasis> This is used to
|
|
hide account types that should not be displayed but are required
|
|
by other account types. E.g. you can hide the Samba domains
|
|
account type and still assign domains when you edit your
|
|
users.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Read-only (LAM Pro only):</emphasis>
|
|
This allows to set a single account type to read-only mode. Please
|
|
note that this is a restriction on functional level (e.g. group
|
|
memberships can be changed on user page even if groups are
|
|
read-only) and is no replacement for setting up proper ACLs on
|
|
your LDAP server.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Custom label:</emphasis> Here you can
|
|
set a custom label for the account types. Use this if the standard
|
|
label does not fit for you (e.g. enter "Servers" for
|
|
hosts).</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">No new entries (LAM Pro
|
|
only):</emphasis> Use this if you want to prevent that new
|
|
accounts of this type are created by your users. The GUI will hide
|
|
buttons to create new entries and also disable file upload for
|
|
this type.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><emphasis role="bold">Disallow delete (LAM Pro
|
|
only):</emphasis> Use this if you want to prevent that accounts of
|
|
this type are deleted by your users.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configTypes2.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>On the next page you can specify in detail what extensions
|
|
should be enabled for each account type.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Modules</title>
|
|
|
|
<para>The modules specify the active extensions for each account type.
|
|
E.g. here you can setup if your user entries should be address book
|
|
entries only or also support Unix or Samba.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configModules1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>Each account type needs a so called "base module". This is the
|
|
basement for all LDAP entries of this type. Usually, it provides the
|
|
structural object class for the LDAP entries. There must be exactly
|
|
one active base module for each account type.</para>
|
|
|
|
<para>Furthermore, there may be any number of additional active
|
|
account modules. E.g. you may select "Personal" as base module and
|
|
Unix + Samba as additional modules.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Module settings</title>
|
|
|
|
<para>Depending on the activated account modules there may be
|
|
additional configuration options available. They can be found on the
|
|
"Module settings" tab. E.g. the Personal account module allows to hide
|
|
several input fields and the Unix module requires to specify ranges
|
|
for UID numbers.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/configSettings1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Cron jobs (LAM Pro)</title>
|
|
|
|
<para>LAM Pro can execute common tasks via cron job. This can be used to
|
|
e.g. notify your users before their passwords expire.</para>
|
|
|
|
<section>
|
|
<title>LDAP and database configuration</title>
|
|
|
|
<para>Please add the LDAP bind user and password for all jobs. This
|
|
LDAP account will be used to perform all LDAP read and write
|
|
operations.</para>
|
|
|
|
<para>Next, select the database type where LAM should store job
|
|
related data. Supported databases are SQLite and MySQL.</para>
|
|
|
|
<para><emphasis role="bold">SQLite</emphasis></para>
|
|
|
|
<para>This is a simple file based database. It needs no special
|
|
database server. The database file will be located next to the server
|
|
profile in config directory.</para>
|
|
|
|
<para>You will need to install the SQLite PDO module for PHP
|
|
(pdo_sqlite.so). For Debian this is located in package
|
|
php5-sqlite.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para><emphasis role="bold">MySQL</emphasis></para>
|
|
|
|
<para>This will store all job data in an external MySQL
|
|
database.</para>
|
|
|
|
<para>You will need to install the MySQL PDO module for PHP
|
|
(pdo_mysql.so). For Debian this is located in package
|
|
php5-mysql.</para>
|
|
|
|
<para>Steps to create a MySQL database and user:</para>
|
|
|
|
<literallayout># login
|
|
mysql -u root -p
|
|
# create a database
|
|
mysql> create database lam_cron;
|
|
#
|
|
mysql> CREATE USER 'lam_cron'@'%' IDENTIFIED BY 'password';
|
|
mysql> CREATE USER 'lam_cron'@'localhost' IDENTIFIED BY 'password';
|
|
# grant access for new user
|
|
mysql> GRANT ALL PRIVILEGES ON lam_cron.* TO 'lam_cron'@'%';
|
|
mysql> GRANT ALL PRIVILEGES ON lam_cron.* TO 'lam_cron'@'localhost';
|
|
</literallayout>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs3.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para><literallayout>
|
|
</literallayout><emphasis role="bold">Test your settings</emphasis></para>
|
|
|
|
<para>After the LDAP and database settings are done you can test your
|
|
settings.</para>
|
|
|
|
<para><emphasis role="bold">Cron entry</emphasis></para>
|
|
|
|
<para>LAM also prints the crontab line that you need to run the
|
|
configured jobs on a daily basis. The command must be run as the same
|
|
user as your webserver is running. You are free to change the starting
|
|
time of the script or run it more often.</para>
|
|
|
|
<para>Dry-run: You can perform a dry-run of the job. This will not
|
|
perform any actions but only print what would be done. For this please
|
|
put "--dryRun" at the end of the command. E.g.:</para>
|
|
|
|
<literallayout> /usr/share/ldap-account-manager/lib/cron.sh lam 123456789 --dryRun</literallayout>
|
|
|
|
<para/>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Adding jobs</title>
|
|
|
|
<para>To add a new job just click on the "Add job" button and select
|
|
the job type you need. The list of available jobs depends on your
|
|
active account modules. E.g. the PPolicy job will only be available if
|
|
you activated PPolicy user module.</para>
|
|
|
|
<para>Depending on the job type jobs may be added multiple times with
|
|
different configurations. For descriptions about the available job
|
|
types see next chapters.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs2.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>Available jobs:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><link linkend="job_ppolicy_password_expire">PPolicy: Notify
|
|
users about password expiration</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_389_password_expire">389ds: Notify users
|
|
about password expiration</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_shadow_password_expire">Shadow: Notify
|
|
users about password expiration</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_shadow_move_expired">Shadow: Delete or
|
|
move expired accounts</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_shadow_account_expiration_note">Shadow:
|
|
Notify users about account expiration</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_windows_password_expire">Windows: Notify
|
|
users about password expiration</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_windows_account_expiration_note">Windows:
|
|
Notify users about account expiration</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_windows_move_expired">Windows: Delete or
|
|
move expired accounts</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_windows_notify_groups">Windows: Notify
|
|
users about their managed groups</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_freeradius_move_expired">FreeRadius:
|
|
Delete or move expired accounts</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link
|
|
linkend="job_freeradius_account_expiration_notification">FreeRadius:
|
|
Notify users about account expiration</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_qmail_move_expired">Qmail: Delete or move
|
|
expired accounts</link></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><link linkend="job_qmail_account_expire_notify">Qmail:
|
|
Notify users about account expiration</link></para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<section id="job_ppolicy_password_expire">
|
|
<title>PPolicy: Notify users about password expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their
|
|
password expires.</para>
|
|
|
|
<para>You need to activate the PPolicy module for users to be able
|
|
to add this job. The job can be added multiple times (e.g. to send a
|
|
second warning at a later time).</para>
|
|
|
|
<para>LAM calculates the expiration date based on the last password
|
|
change and the assigned password policy (or the default policy)
|
|
using attributes pwdMaxAge and pwdExpireWarning.</para>
|
|
|
|
<para>Examples:</para>
|
|
|
|
<para>Warning time (pwdExpireWarning) = 14 days, notification period
|
|
= 10: LAM will send out the email 24 days before the password
|
|
expires</para>
|
|
|
|
<para>Warning time (pwdExpireWarning) = 14 days, notification period
|
|
= 0: LAM will send out the email 14 days before the password
|
|
expires</para>
|
|
|
|
<para>No warning time (pwdExpireWarning), notification period = 10:
|
|
LAM will send out the email 10 days before the password
|
|
expires</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_ppolicy1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before password
|
|
expires.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Default password policy</entry>
|
|
|
|
<entry>Default PPolicy password policy entry (object class
|
|
"pwdPolicy").</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>
|
|
|
|
<para>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
|
|
<section id="job_389_password_expire">
|
|
<title>389ds: Notify users about password expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their
|
|
password expires.</para>
|
|
|
|
<para>You need to activate the Account Locking module for users to
|
|
be able to add this job. The job can be added multiple times (e.g.
|
|
to send a second warning at a later time).</para>
|
|
|
|
<para>LAM calculates the expiration date based on the attribute
|
|
passwordExpirationTime.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_389dsPasswordMail1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para><table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis
|
|
role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before password
|
|
expires.</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table></para>
|
|
|
|
<para>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
|
|
<section id="job_shadow_password_expire">
|
|
<title>Shadow: Notify users about password expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their
|
|
password expires.</para>
|
|
|
|
<para>You need to activate the Shadow module for users to be able to
|
|
add this job. The job can be added multiple times (e.g. to send a
|
|
second warning at a later time).</para>
|
|
|
|
<para>LAM calculates the expiration date based on the last password
|
|
change, the password warning time (attribute "shadowWarning") and
|
|
the specified notification period.</para>
|
|
|
|
<para>Examples:</para>
|
|
|
|
<para>Warning time = 14, notification period = 10: LAM will send out
|
|
the email 24 days before the password expires</para>
|
|
|
|
<para>Warning time = 14, notification period = 0: LAM will send out
|
|
the email 14 days before the password expires</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_shadow1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before password
|
|
expires.</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>
|
|
|
|
<para>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
|
|
<section id="job_shadow_move_expired">
|
|
<title>Shadow: Delete or move expired accounts</title>
|
|
|
|
<para>You can automatically delete or move expired accounts. The job
|
|
checks Shadow account expiration dates (not password expiration
|
|
dates).</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_shadow2.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Delay</entry>
|
|
|
|
<entry>Number of days to wait after the account is
|
|
expired.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Action</entry>
|
|
|
|
<entry>Delete or move accounts</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Target DN</entry>
|
|
|
|
<entry>Move only: specifies the DN where accounts are
|
|
moved</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>
|
|
</section>
|
|
|
|
<section id="job_shadow_account_expiration_note">
|
|
<title>Shadow: Notify users about account expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their whole
|
|
account expires.</para>
|
|
|
|
<para>You need to activate the Shadow module for users to be able to
|
|
add this job. The job can be added multiple times (e.g. to send a
|
|
second warning at a later time).</para>
|
|
|
|
<screenshot>
|
|
<graphic fileref="images/jobs_shadow3.png"/>
|
|
</screenshot>
|
|
|
|
<para><table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis
|
|
role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before account
|
|
expires.</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
|
|
<section id="job_windows_password_expire">
|
|
<title>Windows: Notify users about password expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their
|
|
password expires.</para>
|
|
|
|
<para>You need to activate the Windows module for users to be able
|
|
to add this job. The job can be added multiple times (e.g. to send a
|
|
second warning at a later time).</para>
|
|
|
|
<para>LAM calculates the expiration date based on the last password
|
|
change and the domain policy.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_windows1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before password
|
|
expires.</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>
|
|
|
|
<para>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
|
|
<section id="job_windows_account_expiration_note">
|
|
<title>Windows: Notify users about account expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their whole
|
|
account expires.</para>
|
|
|
|
<para>You need to activate the Windows module for users to be able
|
|
to add this job. The job can be added multiple times (e.g. to send a
|
|
second warning at a later time).</para>
|
|
|
|
<screenshot>
|
|
<graphic fileref="images/jobs_windowsAccountExpiration.png"/>
|
|
</screenshot>
|
|
|
|
<para><table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis
|
|
role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before account
|
|
expires.</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
|
|
<section id="job_windows_move_expired">
|
|
<title>Windows: Delete or move expired accounts</title>
|
|
|
|
<para>You can automatically delete or move expired accounts.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_windowsCleanup.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Delay</entry>
|
|
|
|
<entry>Number of days to wait after the account is
|
|
expired.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Action</entry>
|
|
|
|
<entry>Delete or move accounts</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Target DN</entry>
|
|
|
|
<entry>Move only: specifies the DN where accounts are
|
|
moved</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>
|
|
</section>
|
|
|
|
<section id="job_windows_notify_groups">
|
|
<title>Windows: Notify users about their managed groups</title>
|
|
|
|
<para>This will send your users an email with the groups they
|
|
manage. This also includes a list of users in these groups. The
|
|
users and groups are searched using the user+group account types
|
|
that are specified in server profile.</para>
|
|
|
|
<para>You need to activate the Windows module for users to be able
|
|
to add this job. The job can be added multiple times.</para>
|
|
|
|
<screenshot>
|
|
<graphic fileref="images/jobs_windowsNotifyGroups.png"/>
|
|
</screenshot>
|
|
|
|
<para><table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis
|
|
role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>HTML format</entry>
|
|
|
|
<entry>Send email as HTML instead of plain text.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Period</entry>
|
|
|
|
<entry>Defines how often the mail is sent (e.g.
|
|
quarterly).</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>Use the wildcard "@@LAM_MANAGED_GROUPS@@" to insert the group
|
|
listing. This wildcard is mandatory.</para>
|
|
</section>
|
|
|
|
<section id="job_freeradius_move_expired">
|
|
<title>FreeRadius: Delete or move expired accounts</title>
|
|
|
|
<para>You can automatically delete or move expired accounts.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_freeRadiusCleanup.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Delay</entry>
|
|
|
|
<entry>Number of days to wait after the account is
|
|
expired.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Action</entry>
|
|
|
|
<entry>Delete or move accounts</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Target DN</entry>
|
|
|
|
<entry>Move only: specifies the DN where accounts are
|
|
moved</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>
|
|
</section>
|
|
|
|
<section id="job_freeradius_account_expiration_notification">
|
|
<title>FreeRadius: Notify users about account expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their
|
|
FreeRadius account expires.</para>
|
|
|
|
<para>You need to activate the FreeRadius module for users to be
|
|
able to add this job. The job can be added multiple times (e.g. to
|
|
send a second warning at a later time).</para>
|
|
|
|
<screenshot>
|
|
<graphic fileref="images/jobs_freeradiusAccountExpiration.png"/>
|
|
</screenshot>
|
|
|
|
<para><table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis
|
|
role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before account
|
|
expires.</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
|
|
<section id="job_qmail_move_expired">
|
|
<title>Qmail: Delete or move expired accounts</title>
|
|
|
|
<para>You can automatically delete or move expired accounts. The job
|
|
reads the qmail deletion date of user accounts.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs_qmailCleanup1.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Delay</entry>
|
|
|
|
<entry>Number of days to wait after the account is
|
|
expired.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Action</entry>
|
|
|
|
<entry>Delete or move accounts</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Target DN</entry>
|
|
|
|
<entry>Move only: specifies the DN where accounts are
|
|
moved</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>
|
|
</section>
|
|
|
|
<section id="job_qmail_account_expire_notify">
|
|
<title>Qmail: Notify users about account expiration</title>
|
|
|
|
<para>This will send your users an email reminder before their Qmail
|
|
account expires.</para>
|
|
|
|
<para>You need to activate the Qmail module for users to be able to
|
|
add this job. The job can be added multiple times (e.g. to send a
|
|
second warning at a later time).</para>
|
|
|
|
<screenshot>
|
|
<graphic fileref="images/jobs_qmailAccountExpiration.png"/>
|
|
</screenshot>
|
|
|
|
<para><table>
|
|
<title>Options</title>
|
|
|
|
<tgroup cols="2">
|
|
<tbody>
|
|
<row>
|
|
<entry><emphasis role="bold">Option</emphasis></entry>
|
|
|
|
<entry><emphasis
|
|
role="bold">Description</emphasis></entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>From address</entry>
|
|
|
|
<entry>The email address to set as FROM.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Reply-to address</entry>
|
|
|
|
<entry>Optional Reply-to address for email.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>CC address</entry>
|
|
|
|
<entry>Optional CC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>BCC address</entry>
|
|
|
|
<entry>Optional BCC mail address.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Subject</entry>
|
|
|
|
<entry>The email subject line. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Text</entry>
|
|
|
|
<entry>The email body text. Supports wildcards, see
|
|
below.</entry>
|
|
</row>
|
|
|
|
<row>
|
|
<entry>Notification period</entry>
|
|
|
|
<entry>Number of days to notify before account
|
|
expires.</entry>
|
|
</row>
|
|
</tbody>
|
|
</tgroup>
|
|
</table>Wildcards:</para>
|
|
|
|
<para>You can enter LDAP attributes as wildcards in the form
|
|
@@ATTRIBUTE_NAME@@. E.g. to add the user's common name use "@@cn@@".
|
|
For the common name it would be "@@cn@@".</para>
|
|
|
|
<para>There are also two special wildcards for the expiration date.
|
|
@@EXPIRE_DATE_DDMMYYYY@@ will print the date as e.g. "31.12.2016".
|
|
@@EXPIRE_DATE_YYYYMMDD@@ will print the date as e.g.
|
|
"2016-12-31".</para>
|
|
</section>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Job history</title>
|
|
|
|
<para>This will show the list of all executed job runs and their
|
|
result.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/jobs4.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
</section>
|
|
|
|
<section id="confTypicalScenarios">
|
|
<title>Typical scenarios</title>
|
|
|
|
<para>This is a list of typical scenarios how your LDAP environment may
|
|
look like and how to structure the server profiles for it.</para>
|
|
|
|
<section>
|
|
<title>Simple: One LDAP directory managed by a small group of
|
|
admins</title>
|
|
|
|
<para>This is the easiest and most common scenario. You want to manage
|
|
a single LDAP server and there is only one or a few admins. In this
|
|
case just create one server profile and you are done. The admins may
|
|
be either specified as a fixed list or by using an LDAP search at
|
|
login time.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/LDAPStructuresSimple.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Advanced: One LDAP server which is managed by different admin
|
|
groups</title>
|
|
|
|
<para>Large organisations may have one big LDAP directory for all
|
|
user/group accounts. But the users are managed by different groups of
|
|
admins (e.g. departments, locations, subsidiaries, ...). The users are
|
|
typically divided into organisational units in the LDAP tree. Admins
|
|
may only manage the users in their part of the tree.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/LDAPStructuresAdvanced.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
|
|
<para>In this situation it is recommended to create one server profile
|
|
for each admin group (e.g. department). Setup the LDAP suffixes in the
|
|
server profiles to point to the needed organisational units. E.g. use
|
|
ou=people,ou=department1,dc=company,dc=com or
|
|
ou=department1,ou=people,dc=company,dc=com as LDAP suffix for users.
|
|
Do the same for groups, hosts, ... This way each admin group will only
|
|
see its own users. You may want to use LDAP search for the LAM login
|
|
in this scenario. This will prevent that you need to update a server
|
|
profile if the number of admins changes.</para>
|
|
|
|
<para><emphasis role="bold">Attention:</emphasis> LAM's feature to
|
|
automatically find free UIDs/GIDs for new users/groups will not work
|
|
in this case. LAM uses the user/group suffix to search for already
|
|
assigned UIDs/GIDs. As an alternative you can specify different
|
|
UID/GID ranges for each department. Then the UIDs/GIDs will stay
|
|
unique for the whole directory.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Multiple LDAP servers</title>
|
|
|
|
<para>You can manage as many LDAP servers with LAM as you wish. This
|
|
scenario is similar to the advanced scenario above. Just create one
|
|
server profile for each LDAP server.</para>
|
|
|
|
<screenshot>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="images/LDAPStructuresMultiServer.png"/>
|
|
</imageobject>
|
|
</mediaobject>
|
|
</screenshot>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Single LDAP directory with lots of users (>10 000)</title>
|
|
|
|
<para>LAM was tested to work with 10 000 users. If you have a lot more
|
|
users then you have basically two options.</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para>Divide your LDAP tree in organisational units: This is
|
|
usually the best performing option. Put your accounts in several
|
|
organisational units and setup LAM as in the advanced scenario
|
|
above.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Increase memory limit: Increase the memory_limit parameter
|
|
in your php.ini. This will allow LAM to read more entries. But
|
|
this will slow down the response times of LAM.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
</section>
|
|
</section>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Self Service (LAM Pro)</title>
|
|
|
|
<para>See <link linkend="a_selfService">Self Service
|
|
chapter</link>.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Import and export configuration</title>
|
|
|
|
<para>Here you can export and import LAM's whole configuration. You can
|
|
use this to backup the configuration or migrate from one server to
|
|
another.</para>
|
|
|
|
<para>You will need to login with the configuration master password to use
|
|
this feature.</para>
|
|
|
|
<screenshot>
|
|
<graphic fileref="images/confImportExport1.png"/>
|
|
</screenshot>
|
|
|
|
<para><emphasis role="bold">Export</emphasis></para>
|
|
|
|
<para>This will dump the whole configuration to one big single file. It is
|
|
not possible to dump only parts of the configuration. During import you
|
|
can select what exactly to import.</para>
|
|
|
|
<para><emphasis role="bold">Import</emphasis></para>
|
|
|
|
<para>Please select the import file first and submit. LAM will then
|
|
present you possible import data. You can select what to import using the
|
|
checkboxes.</para>
|
|
|
|
<para>Please note that LAM will not delete e.g. server profiles that are
|
|
not in the import file.</para>
|
|
|
|
<para>Example: You have profile1+profile2 in your LAM installation and
|
|
profile2+profile3 in your import file. When you select to import all
|
|
server profiles then profile1 stays untouched, profile2 will be
|
|
overwritten and profile3 will be added.</para>
|
|
|
|
<screenshot>
|
|
<graphic fileref="images/confImportExport2.png"/>
|
|
</screenshot>
|
|
</section>
|
|
</chapter>
|