Project

General

Profile

Download (24.6 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/*
3
	system_authservers.php
4
*/
5
/* ====================================================================
6
 *	Copyright (c)  2004-2015  Electric Sheep Fencing, LLC. All rights reserved.
7
 *	Copyright (c)  2008 Shrew Soft Inc.
8
 *
9
 *	Redistribution and use in source and binary forms, with or without modification,
10
 *	are permitted provided that the following conditions are met:
11
 *
12
 *	1. Redistributions of source code must retain the above copyright notice,
13
 *		this list of conditions and the following disclaimer.
14
 *
15
 *	2. Redistributions in binary form must reproduce the above copyright
16
 *		notice, this list of conditions and the following disclaimer in
17
 *		the documentation and/or other materials provided with the
18
 *		distribution.
19
 *
20
 *	3. All advertising materials mentioning features or use of this software
21
 *		must display the following acknowledgment:
22
 *		"This product includes software developed by the pfSense Project
23
 *		 for use in the pfSense software distribution. (http://www.pfsense.org/).
24
 *
25
 *	4. The names "pfSense" and "pfSense Project" must not be used to
26
 *		 endorse or promote products derived from this software without
27
 *		 prior written permission. For written permission, please contact
28
 *		 coreteam@pfsense.org.
29
 *
30
 *	5. Products derived from this software may not be called "pfSense"
31
 *		nor may "pfSense" appear in their names without prior written
32
 *		permission of the Electric Sheep Fencing, LLC.
33
 *
34
 *	6. Redistributions of any form whatsoever must retain the following
35
 *		acknowledgment:
36
 *
37
 *	"This product includes software developed by the pfSense Project
38
 *	for use in the pfSense software distribution (http://www.pfsense.org/).
39
 *
40
 *	THIS SOFTWARE IS PROVIDED BY THE pfSense PROJECT ``AS IS'' AND ANY
41
 *	EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42
 *	IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43
 *	PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE pfSense PROJECT OR
44
 *	ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45
 *	SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46
 *	NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47
 *	LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
 *	HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49
 *	STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50
 *	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51
 *	OF THE POSSIBILITY OF SUCH DAMAGE.
52
 *
53
 *	====================================================================
54
 *
55
 */
56

    
57
##|+PRIV
58
##|*IDENT=page-system-authservers
59
##|*NAME=System: Authentication Servers
60
##|*DESCR=Allow access to the 'System: Authentication Servers' page.
61
##|*MATCH=system_authservers.php*
62
##|-PRIV
63

    
64
require("guiconfig.inc");
65
require_once("auth.inc");
66

    
67
$pgtitle = array(gettext("System"), gettext("User Manager"), gettext("Authentication Servers"));
68
$shortcut_section = "authentication";
69

    
70
if (is_numericint($_GET['id'])) {
71
	$id = $_GET['id'];
72
}
73
if (isset($_POST['id']) && is_numericint($_POST['id'])) {
74
	$id = $_POST['id'];
75
}
76

    
77
if (!is_array($config['system']['authserver'])) {
78
	$config['system']['authserver'] = array();
79
}
80

    
81
$a_servers = auth_get_authserver_list();
82
foreach ($a_servers as $servers) {
83
	$a_server[] = $servers;
84
}
85

    
86
if (!is_array($config['ca'])) {
87
	$config['ca'] = array();
88
}
89
$a_ca =& $config['ca'];
90

    
91
$act = $_GET['act'];
92
if ($_POST['act']) {
93
	$act = $_POST['act'];
94
}
95

    
96
if ($act == "del") {
97

    
98
	if (!$a_server[$_GET['id']]) {
99
		pfSenseHeader("system_authservers.php");
100
		exit;
101
	}
102

    
103
	/* Remove server from main list. */
104
	$serverdeleted = $a_server[$_GET['id']]['name'];
105
	foreach ($config['system']['authserver'] as $k => $as) {
106
		if ($config['system']['authserver'][$k]['name'] == $serverdeleted) {
107
			unset($config['system']['authserver'][$k]);
108
		}
109
	}
110

    
111
	/* Remove server from temp list used later on this page. */
112
	unset($a_server[$_GET['id']]);
113

    
114
	$savemsg = sprintf(gettext("Authentication Server %s deleted"), htmlspecialchars($serverdeleted));
115
	write_config($savemsg);
116
}
117

    
118
if ($act == "edit") {
119
	if (isset($id) && $a_server[$id]) {
120

    
121
		$pconfig['type'] = $a_server[$id]['type'];
122
		$pconfig['name'] = $a_server[$id]['name'];
123

    
124
		if ($pconfig['type'] == "ldap") {
125
			$pconfig['ldap_caref'] = $a_server[$id]['ldap_caref'];
126
			$pconfig['ldap_host'] = $a_server[$id]['host'];
127
			$pconfig['ldap_port'] = $a_server[$id]['ldap_port'];
128
			$pconfig['ldap_timeout'] = $a_server[$id]['ldap_timeout'];
129
			$pconfig['ldap_urltype'] = $a_server[$id]['ldap_urltype'];
130
			$pconfig['ldap_protver'] = $a_server[$id]['ldap_protver'];
131
			$pconfig['ldap_scope'] = $a_server[$id]['ldap_scope'];
132
			$pconfig['ldap_basedn'] = $a_server[$id]['ldap_basedn'];
133
			$pconfig['ldap_authcn'] = $a_server[$id]['ldap_authcn'];
134
			$pconfig['ldap_extended_enabled'] = $a_server[$id]['ldap_extended_enabled'];
135
			$pconfig['ldap_extended_query'] = $a_server[$id]['ldap_extended_query'];
136
			$pconfig['ldap_binddn'] = $a_server[$id]['ldap_binddn'];
137
			$pconfig['ldap_bindpw'] = $a_server[$id]['ldap_bindpw'];
138
			$pconfig['ldap_attr_user'] = $a_server[$id]['ldap_attr_user'];
139
			$pconfig['ldap_attr_group'] = $a_server[$id]['ldap_attr_group'];
140
			$pconfig['ldap_attr_member'] = $a_server[$id]['ldap_attr_member'];
141
			$pconfig['ldap_attr_groupobj'] = $a_server[$id]['ldap_attr_groupobj'];
142
			$pconfig['ldap_utf8'] = isset($a_server[$id]['ldap_utf8']);
143
			$pconfig['ldap_nostrip_at'] = isset($a_server[$id]['ldap_nostrip_at']);
144
			$pconfig['ldap_rfc2307'] = isset($a_server[$id]['ldap_rfc2307']);
145

    
146
			if (!$pconfig['ldap_binddn'] || !$pconfig['ldap_bindpw']) {
147
				$pconfig['ldap_anon'] = true;
148
			}
149
		}
150

    
151
		if ($pconfig['type'] == "radius") {
152
			$pconfig['radius_host'] = $a_server[$id]['host'];
153
			$pconfig['radius_auth_port'] = $a_server[$id]['radius_auth_port'];
154
			$pconfig['radius_acct_port'] = $a_server[$id]['radius_acct_port'];
155
			$pconfig['radius_secret'] = $a_server[$id]['radius_secret'];
156
			$pconfig['radius_timeout'] = $a_server[$id]['radius_timeout'];
157

    
158
			if ($pconfig['radius_auth_port'] &&
159
				$pconfig['radius_acct_port']) {
160
				$pconfig['radius_srvcs'] = "both";
161
			}
162

    
163
			if ($pconfig['radius_auth_port'] &&
164
				!$pconfig['radius_acct_port']) {
165
				$pconfig['radius_srvcs'] = "auth";
166
				$pconfig['radius_acct_port'] = 1813;
167
			}
168

    
169
			if (!$pconfig['radius_auth_port'] &&
170
				$pconfig['radius_acct_port']) {
171
				$pconfig['radius_srvcs'] = "acct";
172
				$pconfig['radius_auth_port'] = 1812;
173
			}
174

    
175
		}
176
	}
177
}
178

    
179
if ($act == "new") {
180
	$pconfig['ldap_protver'] = 3;
181
	$pconfig['ldap_anon'] = true;
182
	$pconfig['radius_srvcs'] = "both";
183
	$pconfig['radius_auth_port'] = "1812";
184
	$pconfig['radius_acct_port'] = "1813";
185
}
186

    
187
if ($_POST) {
188
	unset($input_errors);
189
	$pconfig = $_POST;
190

    
191
	/* input validation */
192

    
193
	if ($pconfig['type'] == "ldap") {
194
		$reqdfields = explode(" ",
195
			"name type ldap_host ldap_port " .
196
			"ldap_urltype ldap_protver ldap_scope " .
197
			"ldap_attr_user ldap_attr_group ldap_attr_member ldapauthcontainers");
198

    
199
		$reqdfieldsn = array(
200
			gettext("Descriptive name"),
201
			gettext("Type"),
202
			gettext("Hostname or IP"),
203
			gettext("Port value"),
204
			gettext("Transport"),
205
			gettext("Protocol version"),
206
			gettext("Search level"),
207
			gettext("User naming Attribute"),
208
			gettext("Group naming Attribute"),
209
			gettext("Group member attribute"),
210
			gettext("Authentication container"));
211

    
212
		if (!$pconfig['ldap_anon']) {
213
			$reqdfields[] = "ldap_binddn";
214
			$reqdfields[] = "ldap_bindpw";
215
			$reqdfieldsn[] = gettext("Bind user DN");
216
			$reqdfieldsn[] = gettext("Bind Password");
217
		}
218
	}
219

    
220
	if ($pconfig['type'] == "radius") {
221
		$reqdfields = explode(" ", "name type radius_host radius_srvcs");
222
		$reqdfieldsn = array(
223
			gettext("Descriptive name"),
224
			gettext("Type"),
225
			gettext("Hostname or IP"),
226
			gettext("Services"));
227

    
228
		if ($pconfig['radisu_srvcs'] == "both" ||
229
			$pconfig['radisu_srvcs'] == "auth") {
230
			$reqdfields[] = "radius_auth_port";
231
			$reqdfieldsn[] = gettext("Authentication port");
232
		}
233

    
234
		if ($pconfig['radisu_srvcs'] == "both" ||
235
			$pconfig['radisu_srvcs'] == "acct") {
236
			$reqdfields[] = "radius_acct_port";
237
			$reqdfieldsn[] = gettext("Accounting port");
238
		}
239

    
240
		if (!isset($id)) {
241
			$reqdfields[] = "radius_secret";
242
			$reqdfieldsn[] = gettext("Shared Secret");
243
		}
244
	}
245

    
246
	do_input_validation($_POST, $reqdfields, $reqdfieldsn, $input_errors);
247

    
248
	if (preg_match("/[^a-zA-Z0-9\.\-_]/", $_POST['host'])) {
249
		$input_errors[] = gettext("The host name contains invalid characters.");
250
	}
251

    
252
	if (auth_get_authserver($pconfig['name']) && !isset($id)) {
253
		$input_errors[] = gettext("An authentication server with the same name already exists.");
254
	}
255

    
256
	if (($pconfig['type'] == "ldap") || ($pconfig['type'] == "radius")) {
257
		$to_field = "{$pconfig['type']}_timeout";
258
		if (isset($_POST[$to_field]) && !empty($_POST[$to_field]) && (!is_numeric($_POST[$to_field]) || (is_numeric($_POST[$to_field]) && ($_POST[$to_field] <= 0)))) {
259
			$input_errors[] = sprintf(gettext("%s Timeout value must be numeric and positive."), strtoupper($pconfig['type']));
260
		}
261
	}
262

    
263
	/* if this is an AJAX caller then handle via JSON */
264
	if (isAjax() && is_array($input_errors)) {
265
		input_errors2Ajax($input_errors);
266
		exit;
267
	}
268

    
269
	if (!$input_errors) {
270
		$server = array();
271
		$server['refid'] = uniqid();
272
		if (isset($id) && $a_server[$id]) {
273
			$server = $a_server[$id];
274
		}
275

    
276
		$server['type'] = $pconfig['type'];
277
		$server['name'] = $pconfig['name'];
278

    
279
		if ($server['type'] == "ldap") {
280

    
281
			if (!empty($pconfig['ldap_caref'])) {
282
				$server['ldap_caref'] = $pconfig['ldap_caref'];
283
			}
284
			$server['host'] = $pconfig['ldap_host'];
285
			$server['ldap_port'] = $pconfig['ldap_port'];
286
			$server['ldap_urltype'] = $pconfig['ldap_urltype'];
287
			$server['ldap_protver'] = $pconfig['ldap_protver'];
288
			$server['ldap_scope'] = $pconfig['ldap_scope'];
289
			$server['ldap_basedn'] = $pconfig['ldap_basedn'];
290
			$server['ldap_authcn'] = $pconfig['ldapauthcontainers'];
291
			$server['ldap_extended_enabled'] = $pconfig['ldap_extended_enabled'];
292
			$server['ldap_extended_query'] = $pconfig['ldap_extended_query'];
293
			$server['ldap_attr_user'] = $pconfig['ldap_attr_user'];
294
			$server['ldap_attr_group'] = $pconfig['ldap_attr_group'];
295
			$server['ldap_attr_member'] = $pconfig['ldap_attr_member'];
296

    
297
			$server['ldap_attr_groupobj'] = empty($pconfig['ldap_attr_groupobj']) ? "posixGroup" : $pconfig['ldap_attr_groupobj'];
298

    
299
			if ($pconfig['ldap_utf8'] == "yes") {
300
				$server['ldap_utf8'] = true;
301
			} else {
302
				unset($server['ldap_utf8']);
303
			}
304
			if ($pconfig['ldap_nostrip_at'] == "yes") {
305
				$server['ldap_nostrip_at'] = true;
306
			} else {
307
				unset($server['ldap_nostrip_at']);
308
			}
309
			if ($pconfig['ldap_rfc2307'] == "yes") {
310
				$server['ldap_rfc2307'] = true;
311
			} else {
312
				unset($server['ldap_rfc2307']);
313
			}
314

    
315

    
316
			if (!$pconfig['ldap_anon']) {
317
				$server['ldap_binddn'] = $pconfig['ldap_binddn'];
318
				$server['ldap_bindpw'] = $pconfig['ldap_bindpw'];
319
			} else {
320
				unset($server['ldap_binddn']);
321
				unset($server['ldap_bindpw']);
322
			}
323

    
324
			if ($pconfig['ldap_timeout']) {
325
				$server['ldap_timeout'] = $pconfig['ldap_timeout'];
326
			} else {
327
				$server['ldap_timeout'] = 25;
328
			}
329
		}
330

    
331
		if ($server['type'] == "radius") {
332

    
333
			$server['host'] = $pconfig['radius_host'];
334

    
335
			if ($pconfig['radius_secret']) {
336
				$server['radius_secret'] = $pconfig['radius_secret'];
337
			}
338

    
339
			if ($pconfig['radius_timeout']) {
340
				$server['radius_timeout'] = $pconfig['radius_timeout'];
341
			} else {
342
				$server['radius_timeout'] = 5;
343
			}
344

    
345
			if ($pconfig['radius_srvcs'] == "both") {
346
				$server['radius_auth_port'] = $pconfig['radius_auth_port'];
347
				$server['radius_acct_port'] = $pconfig['radius_acct_port'];
348
			}
349

    
350
			if ($pconfig['radius_srvcs'] == "auth") {
351
				$server['radius_auth_port'] = $pconfig['radius_auth_port'];
352
				unset($server['radius_acct_port']);
353
			}
354

    
355
			if ($pconfig['radius_srvcs'] == "acct") {
356
				$server['radius_acct_port'] = $pconfig['radius_acct_port'];
357
				unset($server['radius_auth_port']);
358
			}
359
		}
360

    
361
		if (isset($id) && $config['system']['authserver'][$id]) {
362
			$config['system']['authserver'][$id] = $server;
363
		} else {
364
			$config['system']['authserver'][] = $server;
365
		}
366

    
367
		write_config();
368

    
369
		pfSenseHeader("system_authservers.php");
370
	}
371
}
372

    
373
// On error, restore the form contents so the user doesn't have to re-enter too much
374
if($_POST && $input_errors) {
375
	$pconfig = $_POST;
376
	$pconfig['ldap_authcn'] = $_POST['ldapauthcontainers'];
377
	$pconfig['ldap_template'] = $_POST['ldap_tmpltype'];
378
}
379

    
380
include("head.inc");
381

    
382
if ($input_errors) {
383
	print_input_errors($input_errors);
384
}
385

    
386
if ($savemsg) {
387
	print_info_box($savemsg, 'success');
388
}
389

    
390
$tab_array = array();
391
$tab_array[] = array(gettext("Users"), false, "system_usermanager.php");
392
$tab_array[] = array(gettext("Groups"), false, "system_groupmanager.php");
393
$tab_array[] = array(gettext("Settings"), false, "system_usermanager_settings.php");
394
$tab_array[] = array(gettext("Authentication Servers"), true, "system_authservers.php");
395
display_top_tabs($tab_array);
396

    
397
if (!($act == "new" || $act == "edit" || $input_errors)) {
398
?>
399
<div class="panel panel-default">
400
	<div class="panel-heading"><h2 class="panel-title"><?=gettext('Authentication Servers')?></h2></div>
401
	<div class="panel-body">
402
		<div class="table-responsive">
403
			<table class="table table-striped table-hover table-condensed sortable-theme-bootstrap" data-sortable>
404
				<thead>
405
					<tr>
406
						<th><?=gettext("Server Name")?></th>
407
						<th><?=gettext("Type")?></th>
408
						<th><?=gettext("Host Name")?></th>
409
						<th><?=gettext("Actions")?></th>
410
					</tr>
411
				</thead>
412
				<tbody>
413
			<?php foreach($a_server as $i => $server): ?>
414
					<tr>
415
						<td><?=htmlspecialchars($server['name'])?></td>
416
						<td><?=htmlspecialchars($auth_server_types[$server['type']])?></td>
417
						<td><?=htmlspecialchars($server['host'])?></td>
418
						<td>
419
						<?php if ($i < (count($a_server) - 1)): ?>
420
							<a class="fa fa-pencil" title="<?=gettext("Edit server"); ?>" href="system_authservers.php?act=edit&amp;id=<?=$i?>"></a>
421
							<a class="fa fa-trash"  title="<?=gettext("Delete server")?>" href="system_authservers.php?act=del&amp;id=<?=$i?>"></a>
422
						<?php endif?>
423
						</td>
424
					</tr>
425
			<?php endforeach; ?>
426
				</tbody>
427
			</table>
428
		</div>
429
	</div>
430
</div>
431

    
432
<nav class="action-buttons">
433
	<a href="?act=new" class="btn btn-success btn-sm">
434
		<i class="fa fa-plus icon-embed-btn"></i>
435
		<?=gettext("Add")?>
436
	</a>
437
</nav>
438
<?php
439
	include("foot.inc");
440
	exit;
441
}
442

    
443
$form = new Form;
444
$form->setAction('system_authservers.php?act=edit');
445

    
446
$form->addGlobal(new Form_Input(
447
	'userid',
448
	null,
449
	'hidden',
450
	$id
451
));
452

    
453
$section = new Form_Section('Server Settings');
454

    
455
$section->addInput($input = new Form_Input(
456
	'name',
457
	'Descriptive name',
458
	'text',
459
	$pconfig['name']
460
));
461

    
462
$section->addInput($input = new Form_Select(
463
	'type',
464
	'Type',
465
	$pconfig['type'],
466
	$auth_server_types
467
))->toggles();
468

    
469
$form->add($section);
470

    
471
// ==== LDAP settings =========================================================
472
$section = new Form_Section('LDAP Server Settings');
473
$section->addClass('toggle-ldap collapse');
474

    
475
if (!isset($pconfig['type']) || $pconfig['type'] == 'ldap')
476
	$section->addClass('in');
477

    
478
$section->addInput(new Form_Input(
479
	'ldap_host',
480
	'Hostname or IP address',
481
	'text',
482
	$pconfig['ldap_host']
483
))->setHelp('NOTE: When using SSL, this hostname MUST match the Common Name '.
484
	'(CN) of the LDAP server\'s SSL Certificate.');
485

    
486
$section->addInput(new Form_Input(
487
	'ldap_port',
488
	'Port value',
489
	'number',
490
	$pconfig['ldap_port']
491
));
492

    
493
$section->addInput(new Form_Select(
494
	'ldap_urltype',
495
	'Transport',
496
	$pconfig['ldap_urltype'],
497
	array_combine(array_keys($ldap_urltypes), array_keys($ldap_urltypes))
498
));
499

    
500
if (empty($a_ca))
501
{
502
	$section->addInput(new Form_StaticText(
503
		'Peer Certificate Authority',
504
		'No Certificate Authorities defined.<br/>Create one under <a href="system_camanager.php">System &gt; Cert Manager</a>.'
505
	));
506
}
507
else
508
{
509
	$ldapCaRef = [];
510
	foreach ($a_ca as $ca)
511
		$ldapCaRef[ $ca['refid'] ] = $ca['descr'];
512

    
513
	$section->addInput(new Form_Select(
514
		'ldap_caref',
515
		'Peer Certificate Authority',
516
		$pconfig['ldap_caref'],
517
		$ldapCaRef
518
	))->setHelp('This option is used if \'SSL Encrypted\' option is choosen. '.
519
		'It must match with the CA in the AD otherwise problems will arise.');
520
}
521

    
522
$section->addInput(new Form_Select(
523
	'ldap_protver',
524
	'Protocol version',
525
	$pconfig['ldap_protver'],
526
	array_combine($ldap_protvers, $ldap_protvers)
527
));
528

    
529
$section->addInput(new Form_Input(
530
	'ldap_timeout',
531
	'Server Timeout',
532
	'number',
533
	$pconfig['ldap_timeout'],
534
	['placeholder' => 25]
535
))->setHelp('Timeout for LDAP operations (seconds)');
536

    
537
$group = new Form_Group('Search scope');
538

    
539
$SSF = new Form_Select(
540
	'ldap_scope',
541
	'Level',
542
	$pconfig['ldap_scope'],
543
	$ldap_scopes
544
);
545

    
546
$SSB = new Form_Input(
547
	'ldap_basedn',
548
	'Base DN',
549
	'text',
550
	$pconfig['ldap_basedn']
551
);
552

    
553

    
554
$section->addInput(new Form_StaticText(
555
	'Search scope',
556
	'Level ' . $SSF . '<br />' . 'Base DN' . $SSB
557
));
558

    
559
$group = new Form_Group('Authentication containers');
560
$group->add(new Form_Input(
561
	'ldapauthcontainers',
562
	'Containers',
563
	'text',
564
	$pconfig['ldap_authcn']
565
))->setHelp('Note: Semi-Colon separated. This will be prepended to the search '.
566
	'base dn above or you can specify full container path containing a dc= '.
567
	'component.<br/>Example: CN=Users;DC=example,DC=com or OU=Staff;OU=Freelancers');
568

    
569
$group->add(new Form_Button(
570
	'Select',
571
	'Select a container'
572
))->removeClass('btn-primary')->addClass('btn-default');
573

    
574
$section->add($group);
575

    
576
$section->addInput(new Form_Checkbox(
577
	'ldap_extended_enabled',
578
	'Extended query',
579
	'Enable extended query',
580
	$pconfig['ldap_extended_enabled']
581
));
582

    
583
$group = new Form_Group('Query');
584
$group->addClass('extended');
585

    
586
$group->add(new Form_Input(
587
	'ldap_extended_query',
588
	'Query',
589
	'text',
590
	$pconfig['ldap_extended_query']
591
))->setHelp('Example: &amp;(objectClass=inetOrgPerson)(mail=*@example.com)');
592

    
593
$section->add($group);
594

    
595
$section->addInput(new Form_Checkbox(
596
	'ldap_anon',
597
	'Bind anonymous',
598
	'Use anonymous binds to resolve distinguished names',
599
	$pconfig['ldap_anon']
600
));
601

    
602
$group = new Form_Group('Bind credentials');
603
$group->addClass('ldapanon');
604

    
605
$group->add(new Form_Input(
606
	'ldap_binddn',
607
	'User DN:',
608
	'text',
609
	$pconfig['ldap_binddn']
610
));
611

    
612
$group->add(new Form_Input(
613
	'ldap_bindpw',
614
	'Password',
615
	'text',
616
	$pconfig['ldap_bindpw']
617
));
618
$section->add($group);
619

    
620
if (!isset($id)) {
621
	$template_list = array();
622

    
623
	foreach($ldap_templates as $option => $template) {
624
		$template_list[$option] = $template['desc'];
625
	}
626

    
627
	$section->addInput(new Form_Select(
628
		'ldap_tmpltype',
629
		'Initial Template',
630
		$pconfig['ldap_template'],
631
		$template_list
632
	));
633
}
634

    
635
$section->addInput(new Form_Input(
636
	'ldap_attr_user',
637
	'User naming attribute',
638
	'text',
639
	$pconfig['ldap_attr_user']
640
));
641

    
642
$section->addInput(new Form_Input(
643
	'ldap_attr_group',
644
	'Group naming attribute',
645
	'text',
646
	$pconfig['ldap_attr_group']
647
));
648

    
649
$section->addInput(new Form_Input(
650
	'ldap_attr_member',
651
	'Group member attribute',
652
	'text',
653
	$pconfig['ldap_attr_member']
654
));
655

    
656
$section->addInput(new Form_Checkbox(
657
	'ldap_rfc2307',
658
	'RFC 2307 Groups',
659
	'LDAP Server uses RFC 2307 style group membership',
660
	$pconfig['ldap_rfc2307']
661
))->setHelp('RFC 2307 style group membership has members listed on the group '.
662
	'object rather than using groups listed on user object. Leave unchecked '.
663
	'for Active Directory style group membership (RFC 2307bis).');
664

    
665
$section->addInput(new Form_Input(
666
	'ldap_attr_groupobj',
667
	'Group Object Class',
668
	'text',
669
	$pconfig['ldap_attr_groupobj'],
670
	['placeholder' => 'posixGroup']
671
))->setHelp('Object class used for groups in RFC2307 mode. '.
672
	'Typically "posixGroup" or "group".');
673

    
674
$section->addInput(new Form_Checkbox(
675
	'ldap_utf8',
676
	'UTF8 Encode',
677
	'UTF8 encode LDAP parameters before sending them to the server.',
678
	$pconfig['ldap_utf8']
679
))->setHelp('Required to support international characters, but may not be '.
680
	'supported by every LDAP server.');
681

    
682
$section->addInput(new Form_Checkbox(
683
	'ldap_nostrip_at',
684
	'Username Alterations',
685
	'Do not strip away parts of the username after the @ symbol',
686
	$pconfig['ldap_nostrip_at']
687
))->setHelp('e.g. user@host becomes user when unchecked.');
688

    
689
$form->add($section);
690

    
691
// ==== RADIUS section ========================================================
692
$section = new Form_Section('RADIUS Server Settings');
693
$section->addClass('toggle-radius collapse');
694

    
695
$section->addInput(new Form_Input(
696
	'radius_host',
697
	'Hostname or IP address',
698
	'text',
699
	$pconfig['radius_host']
700
));
701

    
702
$section->addInput(new Form_Input(
703
	'radius_secret',
704
	'Shared Secret',
705
	'text',
706
	$pconfig['radius_secret']
707
));
708

    
709
$section->addInput(new Form_Select(
710
	'radius_srvcs',
711
	'Services offered',
712
	$pconfig['radius_srvcs'],
713
	$radius_srvcs
714
));
715

    
716
$section->addInput(new Form_Input(
717
	'radius_auth_port',
718
	'Authentication port',
719
	'number',
720
	$pconfig['radius_auth_port']
721
));
722

    
723
$section->addInput(new Form_Input(
724
	'radius_acct_port',
725
	'Accounting port',
726
	'number',
727
	$pconfig['radius_acct_port']
728
));
729

    
730
$section->addInput(new Form_Input(
731
	'radius_timeout',
732
	'Authentication Timeout',
733
	'number',
734
	$pconfig['radius_timeout']
735
))->setHelp('This value controls how long, in seconds, that the RADIUS '.
736
	'server may take to respond to an authentication request. If left blank, the '.
737
	'default value is 5 seconds. NOTE: If you are using an interactive two-factor '.
738
	'authentication system, increase this timeout to account for how long it will '.
739
	'take the user to receive and enter a token.');
740

    
741
if (isset($id) && $a_server[$id])
742
{
743
	$section->addInput(new Form_Input(
744
		'id',
745
		null,
746
		'hidden',
747
		$id
748
	));
749
}
750

    
751
$form->add($section);
752
print $form;
753
?>
754
<script type="text/javascript">
755
//<![CDATA[
756
events.push(function(){
757
	function select_clicked() {
758
		if (document.getElementById("ldap_port").value == '' ||
759
			document.getElementById("ldap_host").value == '' ||
760
			document.getElementById("ldap_scope").value == '' ||
761
			document.getElementById("ldap_basedn").value == '' ||
762
			document.getElementById("ldapauthcontainers").value == '') {
763
			alert("<?=gettext("Please fill the required values.");?>");
764
			return;
765
		}
766

    
767
		if (!document.getElementById("ldap_anon").checked) {
768
			if (document.getElementById("ldap_binddn").value == '' ||
769
				document.getElementById("ldap_bindpw").value == '') {
770
				alert("<?=gettext("Please fill the bind username/password.");?>");
771
				return;
772
			}
773
		}
774
		var url = 'system_usermanager_settings_ldapacpicker.php?';
775
		url += 'port=' + document.getElementById("ldap_port").value;
776
		url += '&host=' + document.getElementById("ldap_host").value;
777
		url += '&scope=' + document.getElementById("ldap_scope").value;
778
		url += '&basedn=' + document.getElementById("ldap_basedn").value;
779
		url += '&binddn=' + document.getElementById("ldap_binddn").value;
780
		url += '&bindpw=' + document.getElementById("ldap_bindpw").value;
781
		url += '&urltype=' + document.getElementById("ldap_urltype").value;
782
		url += '&proto=' + document.getElementById("ldap_protver").value;
783
		url += '&authcn=' + document.getElementById("ldapauthcontainers").value;
784
		<?php if (count($a_ca) > 0): ?>
785
			url += '&cert=' + document.getElementById("ldap_caref").value;
786
		<?php else: ?>
787
			url += '&cert=';
788
		<?php endif; ?>
789

    
790
		var oWin = window.open(url, "pfSensePop", "width=620,height=400,top=150,left=150");
791
		if (oWin == null || typeof(oWin) == "undefined") {
792
			alert("<?=gettext('Popup blocker detected.	Action aborted.');?>");
793
		}
794
	}
795

    
796
	function set_ldap_port() {
797
		if($('#ldap_urltype').find(":selected").index() == 0)
798
			$('#ldap_port').val('389');
799
		else
800
			$('#ldap_port').val('636');
801
	}
802

    
803
	// Hides all elements of the specified class. This will usually be a section
804
	function hideClass(s_class, hide) {
805
		if(hide)
806
			$('.' + s_class).hide();
807
		else
808
			$('.' + s_class).show();
809
	}
810

    
811
	function ldap_tmplchange() {
812
		switch ($('#ldap_tmpltype').find(":selected").index()) {
813
<?php
814
		$index = 0;
815
		foreach ($ldap_templates as $tmpldata):
816
?>
817
			case <?=$index;?>:
818
				$('#ldap_attr_user').val("<?=$tmpldata['attr_user'];?>");
819
				$('#ldap_attr_group').val("<?=$tmpldata['attr_group'];?>");
820
				$('#ldap_attr_member').val("<?=$tmpldata['attr_member'];?>");
821
				break;
822
<?php
823
			$index++;
824
		endforeach;
825
?>
826
		}
827
	}
828

    
829
	// ---------- On initial page load ------------------------------------------------------------
830

    
831
<?php if ($act != 'edit') : ?>
832
	ldap_tmplchange();
833
<?php endif; ?>
834

    
835
	hideClass('ldapanon', $('#ldap_anon').prop('checked'));
836
	$("#Select").prop('type','button');
837
	hideClass('extended', !$('#ldap_extended_enabled').prop('checked'));
838

    
839
	if($('#ldap_port').val() == "")
840
		set_ldap_port();
841

    
842
<?php
843
	if($act == 'edit') {
844
?>
845
		$('#type option:not(:selected)').each(function(){
846
			$(this).attr('disabled', 'disabled');
847
		});
848

    
849
<?php
850
		if(!$input_errors) {
851
?>
852
		$('#name').prop("readonly", true);
853
<?php
854
		}
855
	}
856
?>
857
	// ---------- Click checkbox handlers ---------------------------------------------------------
858

    
859
	$('#ldap_tmpltype').on('change', function() {
860
		ldap_tmplchange();
861
	});
862

    
863
	$('#ldap_anon').click(function () {
864
		hideClass('ldapanon', this.checked);
865
	});
866

    
867
	$('#ldap_urltype').on('change', function() {
868
		set_ldap_port();
869
	});
870

    
871
	$('#Select').click(function () {
872
		select_clicked();
873
	});
874

    
875
	$('#ldap_extended_enabled').click(function () {
876
		hideClass('extended', !this.checked);
877
	});
878

    
879
});
880
//]]>
881
</script>
882
<?php
883
include("foot.inc");
(194-194/229)