Most of the configuration options are self-explanatory but bear the following in mind:
Some of the settings here, such as no. resources to display per page or the bibliographic style, are defaults that users can override in My WIKINDX.
You can add system users from the Admin menu.
When adding or editing resources, each resource can belong to multiple categories and subcategories, be assigned custom fields or defined as belonging to a language – admins can add new categories, subcategories, custom fields and languages from the Admin menu.
Because user sessions are created only once on login, some changes to the configuration will not be registered until a user (logs out and) logs in.
With LDAP enabled and configured, user authentication bypasses the usual WIKINDX logon protocols and is redirected to a LDAP server instead.
The meaning of each option is given by the tooltips. In addition, this help explains how LDAP authentication is done so that you choose the best configuration according to your domain controller.
The LDAP connection test function runs exactly the same code as during user connection. The debugging trace is very comprehensive but the level of detail depends on the loquacity of your server.
The code should work with all LDAP servers. However, it has only been tested with Active Directory and ApacheDS servers. In particular, your user login (or FullName / email) attribute may not be in the proposed list even if the most frequently used are there. You can request it as a feature from the developers.
WIKINDX is not able to renew LDAP password on expiration or bulk import users from a group or OU. It only checks for authentication.
When LDAP authentication is enabled, native authentication is not used except for an attempt to connect the Super Admin. If its LDAP authentication fails, the built-in authentication is used instead.
When LDAP authentication is successful, the user is created in WIKINDX if it did not already exist. The Username (login), Fullname and Email attributes are acquired from the directory server.
Passwords are not stored in WIKINDX database when performing an LDAP authentication. If the LDAP server is offline or any error during the communication with the server occurs, the LDAP authentication will fail.
If the Super Admin subsequently disables LDAP authentication, users created in this way will not be able to log in with built-in authentication without changing their password or asking Super Admin to register one.
The user MUST enter the login details WITHOUT domain information. When you have specified the domain name and the ‘user’ or ‘binduser’ binding methods (connection to the server) are set, the domain name will be added automatically to the login according to the configuration.
First, the binding is configured with the chosen protocol. If the binding is encrypted, the certificates will be ignored. Referrals are always ignored. The network connection timeout is set to 10s. The LDAP search timeout is set to 15s. The server is contacted, and if the connection is successful, then WIKINDX searches for the user and verifies its password.
The user is found in five steps:
(SAM_NORMAL_USER_ACCOUNT: sAMAccountType = 805306368)
whose login attribute corresponds to the input, which are in one of the configured OUs, is extracted in a first list.(SAM_GROUP_OBJECT: sAMAccountType = 268435456 or SAM_NON_SECURITY_GROUP_OBJECT: sAMAccountType = 268435457)
is extracted in a second list.
A user should not have more than one DN but in the unlikely event that there are two users with the same password only the first of the DNs in alphabetical order (regardless of locale) will be authenticated.