instaclick / ldap-bundle
LDAP bundle for Symfony 2.1
Requires
- php: >=5.3.6
- symfony/config: >=2.1.0,<2.2.0
- symfony/dependency-injection: >=2.1.0,<2.2.0
- symfony/event-dispatcher: >=2.1.0,<2.2.0
- symfony/form: >=2.1.0,<2.2.0
- symfony/http-foundation: >=2.1.0,<2.2.0
- symfony/http-kernel: >=2.1.0,<2.2.0
- symfony/security: >=2.1.0,<2.2.0
Requires (Dev)
- symfony/symfony: >=2.1.0,<2.2.0
This package is not auto-updated.
Last update: 2024-10-26 13:09:07 UTC
README
LdapBundle provides a Ldap authentication system without the apache mod_ldap
. It uses php-ldap
extension with a form to authenticate the users. LdapBundle also can be used for the authorization. It retrieves the Ldap users' roles.
Contact
You can try to contact me on freenode irc ; channel #symfony-fr ; pseudo : aways
Install
- Download LdapBundle
- Configure the Autoloader
- Enable the Bundle
- Configure LdapBundle security.yml
- Import LdapBundle security.yml
- Import LdapBundle routing
- Implement Logout
- Subscribe to PRE_BIND event
Get the Bundle
Composer
Modify your composer.json on your project root
// {root}/composer.json { [...], "require": { [...], "imag/ldap-bundle": "dev-master" } }
Enable the Bundle
<?php // app/AppKernel.php public function registerBundles() { $bundles = array( // ... new IMAG\LdapBundle\IMAGLdapBundle(), ); }
Configure security.yml
# src/IMAG/LdapBundle/Resources/config/security.yml security: firewalls: restricted_area: pattern: ^/ anonymous: ~ provider: ldap imag_ldap: ~ # alternative configuration # imag_ldap: # login_path: /ninja/login logout: path: /logout target: / providers: ldap: id: imag_ldap.security.user.provider encoders: IMAG\LdapBundle\User\LdapUser: plaintext access_control: - { path: ^/login, roles: IS_AUTHENTICATED_ANONYMOUSLY } - { path: ^/, roles: IS_AUTHENTICATED_FULLY } imag_ldap: client: host: your.host.foo port: 389 # version: 3 # Optional # username: foo # Optional # password: bar # Optional user: base_dn: ou=people,dc=host,dc=foo # filter: (&(foo=bar)(ObjectClass=Person)) #Optional name_attribute: uid role: base_dn: ou=group, dc=host, dc=foo # filter: (ou=group) #Optional name_attribute: cn user_attribute: member user_id: [ dn or username ]
You need to configure the parameters under the imag_ldap section.
Note:
If are not set, the optional parameters have default values. You can disable this ; Just set parameter to NULL.
imag_ldap: # ... role: # ... filter: NULL
Import security.yml
# app/config/config.yml imports: - { resource: ../../src/IMAG/LdapBundle/Resources/config/security.yml }
Import routing
# app/config/routing.yml imag_ldap: resource: "@IMAGLdapBundle/Resources/config/routing.yml"
Implement Logout
Just create a link with logout target.
<a href="{{ path('logout') }}">logout</a>
Note: You can refer to the official Symfony documentation : http://symfony.com/doc/2.0/book/security.html#logging-out
Subscribe to PRE_BIND event
Now you can perform you own logic before the user is authenticated on Ldap. If you want to break the authentication just return an Exception.
To subscribe:
<tag name="kernel.event_listener" event="imag_ldap.security.authentication.pre_bind" method="onPreBind" />
Exemple:
<?php use IMAG\LdapBundle\Event\LdapUserEvent, public function onPreBind(LdapUserEvent $event) { $user = $event->getUser(); $config = $this->appContext->getConfig(); $ldapConf = $config['ldap']; if (!in_array($user->getUsername(), $ldapConf['allowed'])) { throw new \Exception('Not allowed ldap user'); } $user->addRole('ROLE_LDAP'); }