Use your existing LDAP as authentication-backend for your wordpress!
So what are the differences to other WordPress-LDAP-Authentication-Plugins?
- Flexible: You are totaly free in which LDAP-backend to use. Due to the extensive configuration you can
freely decide how to do the authentication of your users. It simply depends on your
- Independent: As soon as a user logs in, it is added/updated to the WordPress’ user-database
to allow wordpress to always use the correct data. You only have to administer your users once.
- Failsafe: Due to the users being created in WordPress’ User-database they can
also log in when the LDAP-backend currently is gone.
- Role-Aware: You can map WordPress’ roles to values of an existing LDAP-attribute.
For more Information on the configuration have a look at https://github.com/heiglandreas/authLdap
- Installation Instructions
- Upload the extracted folder
- Activate the plugin through the ‘Plugins’ menu in WordPress
- Configure the Plugin via the ‘authLdap’-Configuration-Page.
- Upload the extracted folder
- Where can I find more Informations about the plugin?
Go to https://github.com/heiglandreas/authLdap
- Where can I report issues with the plugin?
Please use the issuetracker at https://github.com/heiglandreas/authLdap/issues
ldap is obtuse. ldap plugins can be even more so. of all the ldap plugins for WP this is the only one i could get to work. relatively simple to use. documentation could be a little clearer, but i figured it out.
there is a local u:p failover to wp DB, which is VERY nice. but for my purposes I wish it was a configurable option to enable/disable. i don’t want a broken ldap auth to failover to local space silently. i’d rather the auth break all together so that i can fix it the right way.
Works very well, including the user roles mapping.
The author is quick to reply in support.
Contributors & Developers
“authLdap” is open source software. The following people have contributed to this plugin.Contributors
- Allows parts of the LDAP-URI to be URLEncoded
- Drops support for PHP 5.4
- Allows multiple LDAP-servers to be queried (given that they use the same attributes)
- Fixes issue with URL-Encoded informations (see https://github.com/heiglandreas/authLdap/issues/108)
- Adds support for TLS
- Update to showing password-fields check (thanks to @chaplina)
- Removed generation of default email-address (thanks to @henryk)
- Fixes password-hashing when caching passwords (thanks to @litinoveweedle)
- Removes the possibility to reset a password for LDAP-based users (thanks to @chaplina)
- Removes the password-change-Email from 4.3 on (thanks to @litinoveweedle)
- Fixes double authentication-attempt (that resulted in failed authentication) (thanks to @litinoveweedle)
- Cleanup by removing deprecated code
- Fixes issues with undefined variables
- Enables internal option-versioning
- Setting users nickname initially to the realname instead of the uid
- Fixes display of password-change possibility in users profile-page
- Fixed an issue with changing display name on every login
- Use proper way of looking up user-roles in setups w/o DB-prefix
- Updated version string
- Use default user to retrieve group menberships and not logging in user.
- return the UID from the LDAP instead of the value given by the user
- remove unnecessary checkbox
- Adds a testsuite
- Fixes PSR2 violations
- Fixed an issue with group-ids
- Moved the code to GitHub (https://github.com/heiglandreas/authLdap)
- Changed the login-process. Now users that are not allowed to login due to
missing group-memberships are not created within your blog as was the standard
until Version 1.0.3 – Thanks to firstname.lastname@example.org
- Changed the default mail-address that is created when no mail-address can be
retrieved from the LDAP from email@example.com to $firstname.lastname@example.org so that
a new user can be created even though the mail address already exists in your
blog – Also thanks to email@example.com
- Added support for WordPress-Table-prefixes as the capabilities of a user
are interlany stored in a field that is named “$tablePrefix_capabilities” –
again thanks to firstname.lastname@example.org and also to sim0n of silicium.mine.nu