WPMU Ldap Plugin

A plugin to override the core WordPress MU authentication method so as to use an LDAP server for authentication.

Author:Aaron Axelsen (profile at wordpress.org)
WordPress version required:
WordPress version tested:6.1.1
Plugin version:5.0.1
Added to WordPress repository:13-06-2012
Last updated:29-11-2022
Rating, %:86
Rated by:3
Plugin URI:http://wpmuldap.tuxdocs.net
Total downloads:11 392
Active installs:80+
plugin download
Click to start download

LDAP authentication is configured on a site-wide (as opposed to per-blog) level, so only Network Admin accounts have access to the configuration to LDAP connection information.

Please make sure you have PHP compiled with LDAP support. This will show up as an LDAP section in your phpinfo() if it is correct.

Remember – all the code for the plugin was contributed by volunteers, and you can show your gratitude by giving back to the community!

How It Works

When enabled, this plugin can automatically create WordPress user accounts and blogs for LDAP-authenticated users. Assuming user credentials authenticate against the LDAP server, creating local accounts and blogs follows this
algorithm:

Create a new WPMU User, with LDAP username and a randomly generated password.
Some user information, such as first and last name, is extracted from the
information returned from the LDAP server.
Actions for user creation and activation are triggered.
The user’s domain / URL are created depending on plugin configuration (i.e.,
VHost vs SubDir).
If the option is set, a blog is created, with path and name based on the LDAP
username and the blog is activated with the user being Administrator, and
appropriate actions are triggered.

It should be noted that even though a random password is created for a user (for WPMU accounts), it is never displayed to the user. This is intentional so that there is no confusion as to which password should be used; it will always be using LDAP credentials. As a result, though, if ever LDAP is disabled or if the server is unavailable, users created with LDAP authentication will be unable to log in unless their passwords are reset.


ChangeLog