diff --git a/doc/quick_ldap_backend.rst b/doc/quick_ldap_backend.rst index a96b3fa2b..118560857 100644 --- a/doc/quick_ldap_backend.rst +++ b/doc/quick_ldap_backend.rst @@ -21,20 +21,20 @@ How to authenticate users against an LDAP server with anonymous binding ? 2. Configure your local_settings.py file for authenticating against LDAP. The next lines must be added:: - AUTHENTICATION_BACKENDS += ( 'django_auth_ldap.backend.LDAPBackend', ) + AUTHENTICATION_BACKENDS += ( 'django_auth_ldap.backend.LDAPBackend', ) - import ldap - from django_auth_ldap.config import LDAPSearch + import ldap + from django_auth_ldap.config import LDAPSearch - # Here put the LDAP URL of your server - AUTH_LDAP_SERVER_URI = 'ldap://ldap.example.com' - # Let the bind DN and bind password blank for anonymous binding - AUTH_LDAP_BIND_DN = "" - AUTH_LDAP_BIND_PASSWORD = "" - # Lookup user under the branch o=base and by mathcing their uid against the - # received login name - AUTH_LDAP_USER_SEARCH = LDAPSearch("o=base", - ldap.SCOPE_SUBTREE, "(uid=%(user)s)") + # Here put the LDAP URL of your server + AUTH_LDAP_SERVER_URI = 'ldap://ldap.example.com' + # Let the bind DN and bind password blank for anonymous binding + AUTH_LDAP_BIND_DN = "" + AUTH_LDAP_BIND_PASSWORD = "" + # Lookup user under the branch o=base and by mathcing their uid against the + # received login name + AUTH_LDAP_USER_SEARCH = LDAPSearch("o=base", + ldap.SCOPE_SUBTREE, "(uid=%(user)s)") How to allow members of an LDAP group to manage Authentic ? ----------------------------------------------------------- @@ -47,13 +47,13 @@ How to allow members of an LDAP group to manage Authentic ? 3. Add the following lines:: - from django_auth_ldap.config import GroupOfNamesType - AUTH_LDAP_GROUP_TYPE = GroupOfNamesType() - AUTH_LDAP_GROUP_SEARCH = LDAPSearch("o=mycompany", + from django_auth_ldap.config import GroupOfNamesType + AUTH_LDAP_GROUP_TYPE = GroupOfNamesType() + AUTH_LDAP_GROUP_SEARCH = LDAPSearch("o=mycompany", ldap.SCOPE_SUBTREE, "(objectClass=groupOfNames)") - AUTH_LDAP_USER_FLAGS_BY_GROUP = { + AUTH_LDAP_USER_FLAGS_BY_GROUP = { "is_staff": "cn=admin,o=mycompany" - } + } For an objectClass of groupOfUniqueNames you would change the string GroupOfNamesType to GroupOfUniqueNamesType and grouOfNames to