Rt and ldap or active directory

hi
i’m having a look at trying authenticate rt with
active directory. I downloaded LDAP1.0_RT3 and put the
files in the appropriate places and edited the
SiteConfig_LDAP. But theres no instructions I can find
and now I’m lost. How do I put the main SiteConfig to
include the LDAP one ? Can I use active dir/or any
ldap when user exists there but if it doesn’t have it
look up its local mysql database ? This is all on
fedora core 3 and rt 3.2.2.
Elaine

How much free photo storage do you get? Store your holiday
snaps for FREE with Yahoo! Photos http://uk.photos.yahoo.com

We are extremely interested in this also and it is one of our first
priorities before going into produciton this summer (however it is not
a showstopper). We will be going live with RT 3.2.4 (+RTFM) and Fedora
Core 3 with modperl. This is on a mixed MS Server / linux environment
where most of the workstations and servers are MS but the firewall,
RT,Bugzilla,wiki and some fileservers are on linux (Fedora Core 3),
We hope to add a wiki section on this, or contribute to one along with
our integration of RT and Bugzilla. RT is working fine at the present
time and the integration with AD is the last missing piece for us.
There are scattered bits of email on this in the list archives but
nothing much of any substance for our capabilities (low on
programming, more admin types used to cut and paste type mods). I
think the main problem here has been that most of the previous posts
have been those trying to get LDAP integration with AD to work for the
first time, which is a different issue than getting RT to work with it
after it is in place. We have yet to get AD authorization working well
for anything yet so have been holding off on addressing the RT
integration. In the mean time we are monitoring any discussion of
this with great interest.On 5/5/05, Elaine . cmap_sec@yahoo.co.uk wrote:

hi
i’m having a look at trying authenticate rt with
active directory. I downloaded LDAP1.0_RT3 and put the
files in the appropriate places and edited the
SiteConfig_LDAP. But theres no instructions I can find
and now I’m lost. How do I put the main SiteConfig to
include the LDAP one ? Can I use active dir/or any
ldap when user exists there but if it doesn’t have it
look up its local mysql database ? This is all on
fedora core 3 and rt 3.2.2.
Elaine


How much free photo storage do you get? Store your holiday
snaps for FREE with Yahoo! Photos http://uk.photos.yahoo.com


The rt-users Archives

Be sure to check out the RT Wiki at http://wiki.bestpractical.com

i’m having a look at trying authenticate rt with
active directory.

You might try http://www.mosemann.com/software/LDAPSMB1.2_RT3.tar.gz
It has been tested with 3.4.0 and 3.4.1. I don’t know about 3.2.2.

Russell Mosemann, Ph.D. * Computing Services * Concordia University, Nebraska
“It’s mind over matter. If you don’t have a mind, it doesn’t matter.”

Also working fine with 3.4.2 and ADS as of last night. :slight_smile:

MattFrom: rt-users-bounces@lists.bestpractical.com
[mailto:rt-users-bounces@lists.bestpractical.com]On Behalf Of Russell
Mosemann
Sent: Thursday, May 05, 2005 7:05 AM
To: Elaine .
Cc: rt-users@lists.bestpractical.com
Subject: Re: [rt-users] rt and ldap or active directory

i’m having a look at trying authenticate rt with
active directory.

You might try http://www.mosemann.com/software/LDAPSMB1.2_RT3.tar.gz
It has been tested with 3.4.0 and 3.4.1. I don’t know about 3.2.2.

Russell Mosemann, Ph.D. * Computing Services * Concordia University, Nebraska
“It’s mind over matter. If you don’t have a mind, it doesn’t matter.”

http://lists.bestpractical.com/cgi-bin/mailman/listinfo/rt-users

Be sure to check out the RT Wiki at http://wiki.bestpractical.com

-----Message Disclaimer-----

This e-mail message is intended only for the use of the individual or
entity to which it is addressed, and may contain information that is
privileged, confidential and exempt from disclosure under applicable law.
If you are not the intended recipient, any dissemination, distribution or
copying of this communication is strictly prohibited. If you have
received this communication in error, please notify us immediately by
reply email to Connect@principal.com and delete or destroy all copies of
the original message and attachments thereto. Email sent to or from the
Principal Financial Group or any of its member companies may be retained
as required by law or regulation.

Nothing in this message is intended to constitute an Electronic signature
for purposes of the Uniform Electronic Transactions Act (UETA) or the
Electronic Signatures in Global and National Commerce Act (“E-Sign”)
unless a specific statement to the contrary is included in this message.

Blockquote

  1. Click Administration > User Management > SSO Providers.
  2. Click Add > Microsoft Active Directory.
  3. Enter a descriptive Name for the Active Directory server.
  4. Enter the name of the Domain where the server is located.
  5. In the Server 1 Host field, type the IP address or FQDN of the Active Directory server.
  6. In the Server 2 Host field, type the IP address or FQDN of the fallback server if one is configured.
  7. Select the Primary Server.
  8. The Port should be left at the default 389. If the Active Directory server is over SSL, enter 636.
  9. To connect to the LDAP server using a secure sockets layer, select SSL Enabled. Self Signed Certificates
    SSL certificates on LDAP servers cannot be self-signed. You will need to configure your LDAP server to use certificates with the CA property set (Root CA Certificates).
  10. In the Base DN field, enter the Distinguished Name of the OU or CN where the Active Directory users exist.

cn=users,dc=test,dc=com

  1. In the Search Filter field, enter the search criteria.

(&(objectclass=user)(displayName=Smith))

  1. To connect to the LDAP server anonymously, select Anonymous Bind.

By default, Active Directory servers do not allow anonymous access. Only select this option if you have enabled Anonymous access on your Active Directory server.

  1. If you did not select to connect anonymously, enter the name of the Domain Administrator Account that N-able N-central uses to sign in to the Active Directory server in the format domain\username and enter the Password.
  2. Click Test Connection to confirm that N-able N-central can successfully communicate with the Active Directory server
  3. Click Save.

LDAP is a way of speaking to Active Directory . LDAP is a protocol that many different directory services and access management solutions can understand. The relationship between AD and LDAP is much like the relationship between Apache and HTTP: HTTP is a web protocol.

Thank You Moderator for approving my comment
how to clean divan bed base