Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Better Documentation / explanation of how to setup #15

Open
imp1sh opened this issue Nov 27, 2014 · 3 comments
Open

Better Documentation / explanation of how to setup #15

imp1sh opened this issue Nov 27, 2014 · 3 comments

Comments

@imp1sh
Copy link

imp1sh commented Nov 27, 2014

Thank you so much for this solution, but I don't bring it up and running.
What I would need is just a little better explanation of what which parameter means.

In the first place I'd like to get authentication running in a more basic sense.
Secondly I also would like to create a group within my ldap structure that selects the users that may actually use etherpad (ACL).

Thank you

@tykeal
Copy link
Owner

tykeal commented Dec 1, 2014

The plugin doesn't support a group ACL structure like you're requesting. The group that is defined is the group that should have administrative access. Any other user that passes the filters is allowed access to the pads.

@imp1sh
Copy link
Author

imp1sh commented Dec 5, 2014

Ok, thanks.
What about those two parameters?
"searchDN": "uid=searchuser,dc=example,dc=com",
"searchPWD": "supersecretpassword",
I suspect they are being to authenticate your script at the ldap service.
But what if I don't want to give credentials but want to search the tree actually anonymously?

@tykeal
Copy link
Owner

tykeal commented Dec 5, 2014

When I was writing the module the LDAP library that I used didn't support anonymous binding. I haven't looked into if it does now or not. As such, this plugin requires a user for doing information lookups.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants