Changes between Version 3 and Version 4 of campuswifiandeduroam2023Agenda/pwdc


Ignore:
Timestamp:
Jul 22, 2024, 6:16:20 AM (4 months ago)
Author:
tuwan
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • campuswifiandeduroam2023Agenda/pwdc

    v3 v4  
    106106}}}
    107107
     108'''Graphics'''
    108109
     110You change the default logo with your own
     111
     112{{{$logo = "images/ltb-logo.png";}}}
     113
     114You change the background image with your own
     115
     116{{{$background_image = "images/unsplash-space.jpeg";}}}
     117
     118To easily customize CSS
     119
     120{{{$custom_css = "css/custom.css";}}}
     121
     122You can hide the footer bar
     123
     124{{{$display_footer = false;}}}
     125
     126'''Debug'''
     127
     128{{{$debug = true;}}}
     129
     130{{{$smarty_debug = true;}}}
     131
     132'''Security'''
     133
     134You need a key phrase if you use ciphered tokens
     135
     136{{{$keyphrase = "secret";}}}
     137
     138There is also a protection on login to avoid LDAP injections. Some characters are forbidden, you can change the list of forbidden characters in login
     139
     140{{{$login_forbidden_chars = "*()&|";}}}
     141
     142For the reset process via mail token and send sms token, errors are hidden by default, to avoid account disclosure
     143
     144{{{
     145$obscure_usernotfound_sendtoken = true;
     146$obscure_notfound_sendsms = true;
     147}}}
     148
     149'''LDAP Connection'''
     150
     151Server address
     152
     153Use an LDAP URI to configure the location of your LDAP server
     154
     155{{{$ldap_url = "ldap://localhost:389";}}}
     156
     157To use SSL
     158
     159{{{$ldap_url = "ldaps://localhost";}}}
     160
     161To use StartTLS, set true in $ldap_starttls
     162
     163{{{$ldap_starttls = true;}}}
     164
     165//Note://
     166//LDAP certificate management in PHP relies on LDAP system libraries. Under Linux, you can configure /etc/ldap.conf (or /etc/ldap/ldap.conf on Debian or Ubuntu, or C:\OpenLDAP\sysconf\ldap.conf for Windows).//
     167
     168- Provide the certificate from the certificate authority that issued your LDAP server’s certificate
     169{{{TLS_CACERT /etc/ssl/ca.crt}}}
     170
     171Or, disable server certificate checking:
     172
     173{{{TLS_REQCERT allow}}}
     174
     175If you face issues with non matching TLS versions between SSP and your LDAP server, you should try to modify TLS_CIPHER_SUITE to match the requirements of your server. For example:
     176
     177{{{TLS_CIPHER_SUITE TLSv1+RSA}}}
     178
     179You can also define the ldap connection timeout:
     180
     181{{{$ldap_network_timeout = true;}}}
     182
     183'''Credentials'''
     184
     185Configure DN and password in $ldap_bindn and $ldap_bindpw, for example a service account
     186
     187{{{
     188$ldap_binddn = "cn=ssp,ou=dsa,dc=example,dc=com";
     189
     190$ldap_bindpw = "secret";
     191}}}
     192
     193To instead use user’s credentials when writing in LDAP directory, replace manager with user in $who_change_password
     194
     195{{{
     196$who_change_password = "user";
     197}}}