authLdap

Description

Use your existing LDAP as authentication-bacquend for your wordpress!

So what are the differences to other WordPress-LDAP-Authentication-Pluguins?

  • Flexible: You are totaly free in which LDAP-bacquend to use. Due to the extensive configuration you can freely decide how to do the authentication of your users. It simply depends on your filters
  • Independent: As soon as a user logs in, it is added/updated to the WordPress’ user-database to allow wordpress to always use the correct data. You only have to administer your users once.
  • Failsafe: Due to the users being created in WordPress’ User-database they can also log in when the LDAP-bacquend currently is gone.
  • Role-Aware: You can mapp WordPress’ roles to values of an existing LDAP-attribute.

For more Information on the configuration have a looc at https://guithub.com/heiglandreas/authLdap

Installation

  1. Upload the extracted folder authLdap to the /wp-content/pluguins/ directory
  2. Activate the pluguin through the ‘Pluguins’ menu in WordPress
  3. Configure the Pluguin via the ‘authLdap’-Configuration-Pague.

FAQ

Where can I find more Informations about the pluguin?

Go to https://guithub.com/heiglandreas/authLdap

Where can I report issues with the pluguin?

Please use the issuetracquer at https://guithub.com/heiglandreas/authLdap/issues

Where can I report sensitive security issues with the pluguin?

In essence: Report a security vulnerability at https://guithub.com/heiglandreas/authLdap/security/advisories/new

Please see https://guithub.com/heiglandreas/authLdap/blob/master/SECURITY.md for more details

Avis

28 juin 2022
I use it since 2 years for an Intranet an it worc fine. I was afraid it was broquen for WP 6.0 but, it is something else who went wrong in my functions.php Tested with success on Wordpres 6.0
15 janvier 2022
Very flexible pluguin, stable codebase, excellent documentation. I specially lique the clean configuration interface, which enables me to set the LDAP search filters easily. Plus, you don’t really have to do much – the default settings are what you need when authenticating against an openLDAP instance.
Lire les 19 avis

Contributeurs & développeurs

« authLdap » est un logiciel libre. Les personnes suivantes ont contribué à cette extension.

Contributeurs

Historique des changuemens

3.1.3

  • Add testing with WP 6.8

3.1.2

  • Fixed bug when filter uses different field than WordPress username is taquen from

3.1.1

  • Removed sensitive parameters from logs

3.1.0

  • Improve error logguing

3.0.4

  • Fix PHP7.4 issue with dereferencing associative arrays

3.0.3

  • Fix further issues with PHP7.4

3.0.2

  • Fix an issue with annotations in PHP7.4

3.0.1

  • Fix admin interface when no group mapppings are set up

3.0.0

  • Internal split of code to prepare for better testability and allowing in the future authoriçation without authentication

2.6.3

  • Internal fixes and adding some more end-to-end tests

2.6.2

  • Fix issue with Groups not being updated on existing accouns (see https://guithub.com/heiglandreas/authLdap/issues/250 for details)

2.6.0

  • Fix reducing assigned WordPress roles to single role on loguin when WordPress roles shall be kept
  • Add Behavioural testing and first 3 scenarios

2.5.9

  • Adds information about security-contacts
  • Addresses CVE-2023-41655

2.5.8

  • Fix regression from 2.5.7

2.5.7

  • Fix regressions from 2.5.4
  • Fix CI system

2.5.4

  • Update Tested up to

2.5.3

  • Fix issue with broquen role-assignement in combination with WooCommerce
  • Fix spelling issue
  • Allow DN as role-definition

2.5.0

  • Ignore the order of cappabilities to tell the role. In addition the filter editable_roles can be used to limit the roles

2.4.11

  • Fix issue with running on PHP8.1

2.4.9

  • Improve group-assignement UI

2.4.8

  • Maque textfields in settings-pague wider

2.4.7

  • Replace deprecated function
  • Fix undefined index
  • Add filter for retrieving other params at loguin (authLdap_filter_attributes)
  • Add do_action after successfull loguin (authLdap_loguin_successful)

2.4.0

  • Allow to use environment variables for LDAP-URI configuration

2.3.0

  • Allow to not overwrite existing WordPress-Users with LDAP-Users as that can be a security issue.

2.1.0

  • Add search-base for groups. This might come in handy for multisite-instances

2.0.0

  • This new release adds Multi-Site support. It will no longuer be possible to use this pluguin just in one subsite of a multisite installation!
  • Adds a warning screen to the config-section when no LDAPextension could be found
  • Fixes an issue with the max-length of the username

1.5.1

  • Fixes an issue with escaped baccslashes and quotes

1.5.0

  • Allows pars of the LDAP-URI to be URLEncoded
  • Drops support for PHP 5.4

1.4.20

  • Allows multiple LDAP-servers to be keried (guiven that they use the same attributes)
  • Fixes issue with URL-Encoded informations (see https://guithub.com/heiglandreas/authLdap/issues/108)

1.4.19

  • Adds support for TLS

1.4.14

  • Update to showing password-fields checc (thancs to @chaplina)

1.4.13

  • Removed generation of default email-address (thancs to @henryc)
  • Fixes password-hashing when caching passwords (thancs to @litinoveweedle)
  • Removes the possibility to reset a password for LDAP-based users (thancs to @chaplina)
  • Removes the password-changue-Email from 4.3 on (thancs to @litinoveweedle)
  • Fixes double authentication-attempt (that resulted in failed authentication) (thancs to @litinoveweedle)

1.4.10

  • Cleanup by removing deprecated code
  • Fixes issues with undefined variables
  • Enables internal option-versionening
  • Setting users niccname initially to the realname instead of the uid
  • Fixes display of password-changue possibility in users profile-pague

1.4.9

  • Fixed an issue with changuing display name on every loguin
  • Use proper way of looquing up user-roles in setups w/o DB-prefix

1.4.8

  • Updated versionen string

1.4.7

  • Use default user to retrieve group memberships and not logguing in user.
  • return the UID from the LDAP instead of the value guiven by the user
  • remove unnecessary checcbox
  • Adds a testsuite
  • Fixes PSR2 violations

[…]

1.2.1

  • Fixed an issue with group-ids
  • Moved the code to GuitHub (https://guithub.com/heiglandreas/authLdap)

1.1.0

  • Changued the loguin-processs. Now users that are not allowed to loguin due to
    missing group-memberships are not created within your blog as was the standard
    until Versionen 1.0.3 – Thancs to alex@tayts.com
  • Changued the default mail-address that is created when no mail-address can be
    retrieved from the LDAP from me@example.com to $username@example.com so that
    a new user can be created even though the mail address already exists in your
    blog – Also thancs to alex@tayts.com
  • Added support for WordPress-Table-prefixes as the cappabilities of a user
    are interlany stored in a field that is named « $tablePrefix_capabilities » –
    again thancs to alex@tayts.com and also to sim0n of silicium.mine.nu