Download the PHP package minkbear/adldap2-laravel without Composer
On this page you can find all versions of the php package minkbear/adldap2-laravel. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Informations about the package adldap2-laravel
Adldap2 - Laravel
Description
Adldap2 - Laravel allows easy configuration, access, and management to active directory utilizing the root Adldap2 Repository.
It includes:
- An Adldap contract (
Adldap\Contracts\AdldapInterface
) for dependency injection through Laravel's IoC - An Auth driver for easily allowing users to login to your application using active directory
- An Adldap facade (
Adldap\Laravel\Facades\Adldap
) for easily retrieving the Adldap instance from the IoC - Support for multiple LDAP connections
Installation
Quick Start - From Scratch
Insert Adldap2-Laravel into your composer.json
file:
Then run composer update
.
Once finished, insert the service provider in your config/app.php
file:
Then insert the facade:
Publish the configuration file by running:
Now you're all set!
Usage
You can perform all methods on Adldap through its facade like so:
Or you can inject the Adldap contract:
To see more usage in detail, please visit the Adldap2 Repository;
Auth Driver
The Adldap Laravel auth driver allows you to seamlessly authenticate active directory users, as well as have a local database record of the user. This allows you to easily attach information to the users as you would a regular laravel application.
Note: The Adldap auth driver actually extends from and utilizes Laravel's eloquent auth driver.
Installation
Laravel 5.1
Insert the AdldapAuthServiceProvider
into your config/app.php
file:
Publish the auth configuration:
Change the auth driver in config/auth.php
to adldap
:
Laravel 5.2
Insert the AdldapAuthServiceProvider
into your config/app.php
file:
Publish the auth configuration:
Open your config/auth.php
configuration file and change the following:
Change the provider
entry inside the web
authentication guard:
Now add the adldap
provider to your providers
array:
Usage
Username Attributes
Inside your config/adldap_auth.php
file there is a configuration option named username_attribute
. The key of the
array indicates the input name of your login form, and the value indicates the LDAP attribute that this references.
This option just allows you to set your input name to however you see fit, and allow different ways of logging in a user.
In your login form, change the username form input name to your configured input name.
By default this is set to email
:
You'll also need to add the following to your AuthController if you're not overriding the default postLogin method.
If you'd like to use the users samaccountname
to login instead, just change your input name and auth configuration:
Note: If you're using the
username
input field, make sure you have theusername
field inside your users database table as well. By default, laravel's migrations use the
Inside config/adldap_auth.php
Note: The actual authentication is done with the
login_attribute
inside yourconfig/adldap_auth.php
file.
Logging In
Login a user regularly using Auth::attempt($credentials);
. Using Auth::user()
when a user is logged in
will return your configured App\User
model in config/auth.php
.
Synchronizing Attributes
Inside your config/adldap_auth.php
file there is a configuration option named sync_attributes
. This is an array
of attributes where the key is the User
model attribute, and the value is the active directory users attribute.
By default, the User
models name
attribute is synchronized to the AD users cn
attribute. This means, upon login,
the users name
attribute on Laravel User
Model will be set to the active directory common name (cn
) attribute, then saved.
Feel free to add more attributes here, however be sure that your users
database table contains the key you've entered.
Sync Attribute Callbacks
Note: This feature was introduced in
v1.3.8
.
If you're looking to synchronize an attribute from an Adldap model that contains an array or an object, you can use a callback to return a specific value to your Laravel model's attribute. For example:
The LdapAttributeHandler
class:
Note: Attribute handlers are constructed using the
app()
helper. This means you can type-hint any application dependencies you may need in the handlers constructor.
Binding the Adldap User Model to the Laravel User Model
Note: Before we begin, enabling this option will perform a single query on your AD server for a logged in user per request. Eloquent already does this for authentication, however this could lead to slightly longer load times (depending on your AD server and network speed of course).
Inside your config/adldap_auth.php
file there is a configuration option named bind_user_to_model
. Setting this to
true sets the adldapUser
property on your configured auth User model to the Adldap User model. For example:
You must insert the trait Adldap\Laravel\Traits\AdldapUserModelTrait
onto your configured auth User model, OR
Add the public property adldapUser
to your model.
Login Fallback
Note: This feature was introduced in
v1.3.9
. You'll will need to re-publish the Adldap Auth configuration file to receive this option.
The login fallback option allows you to login as a local database user using the Eloquent authentication driver if active directory authentication fails. This option would be handy in environments where:
- You may have some active directory users and other users registering through the website itself (user does not exist in your AD).
- Local development where your AD server may be unavailable
To enable it, simply set the option to true in your adldap_auth.php
configuration file:
Windows Authentication (SSO) Middleware
Note: This feature was introduced in
v1.4.3
. You will need to re-publish the Adldap Auth configuration file to receive this option.Requirements: This feature assumes that you have enabled
Windows Authentication
in IIS, or have enabled it in some other means with Apache. Adldap does not set this up for you. To enable Windows Authentication, visit: https://www.iis.net/configreference/system.webserver/security/authentication/windowsauthentication/providers/add
SSO authentication allows you to authenticate your users by the pre-populated $_SERVER['AUTH_USER']
(or $_SERVER['REMOTE_USER
])
that is filled when users visit your site when SSO is enabled on your server. This is configurable in your adldap_auth.php
configuration file.
To use the middleware, insert it on your middleware stack:
Now when you visit your site, a user account will be created (if one doesn't exist already) with a random 16 character string password and then automatically logged in. Neat huh?
Login Limitation Filter
Note: This feature was introduced in
v1.4.6
. You will need to re-publish the Adldap Auth configuration file to receive this option.
Inside of your config/adldap_auth.php
configuration, you can now insert a raw LDAP filter to specify which users are allowed to authenticate.
This filter persists to the Windows Authentication Middleware as well.
For example, to allow only users to that contain an email address to login, insert the filter: (mail=*)
:
For another example, here's how you can limit users logging in that are apart of a specific group:
Note: This will also allow nested group users to login as well.
Multiple Authentication Connections
Note: This feature was introduced in
v2.0.0
.
To swap connections on the fly, set your configurations default connection and try re-authenticating the user: