Use the Bugzilla MySQL database as an external authentication source in WordPress.
Author: | Michel Verbraak (profile at wordpress.org) |
WordPress version required: | 3.0 |
WordPress version tested: | 3.3.2 |
Plugin version: | 1.0 |
Added to WordPress repository: | 09-03-2012 |
Last updated: | 09-03-2012
Warning! This plugin has not been updated in over 2 years. It may no longer be maintained or supported and may have compatibility issues when used with more recent versions of WordPress.
|
Rating, %: | 0 |
Rated by: | 0 |
Plugin URI: | http://www.1st-setup.nl/ |
Total downloads: | 1 118 |
Click to start download
|
The Bugzilla Authentication plugin allows you to authenticate a user also against the profiles table in a Bugzilla database.
Requirements
- Network access to your Bugzilla MySQL database.
- PHP with MySQL support.
- Bugzilla version 3.* or higher. Tested with version 4.2
More info
To follow updates to this plugin, visit:
http://www.1st-setup.nl/wordpress/?page_id=343
For help with this version, visit:
http://www.1st-setup.nl/wordpress/?page_id=343
Screenshots
Plugin options, allowing Bugzilla authentication
WordPress login form with Bugzilla create new user button and Extra message text
FAQ
How does this plugin authenticate users?
When a user tries to login the plugin will try to find the user in the profiles table, identified by login_name, of the specified Bugzilla database. When the user account is enabled in Bugzilla and found it will use the salt of the crypted Bugzilla password to generate a crypted version of the specified login password and if the crypted passwords match it will log you in.
If it did not find a valid username or password match in the Bugzilla database it will try to authenticate against the WordPress user list.
By default, this plugin generates a random password each time you create a user or edit an existing user’s profile. However, since this plugin requires an external authentication mechanism, this password is not requested by WordPress. Generating a random password helps protect accounts, preventing one authorized user from pretending to be another.
If I disable this plugin, how will I login?
When you disable this plugin you are left only with the default authentication against the WordPress user list.
Because this plugin generates a random password when you create a new user or edit an existing user’s profile, you will most likely have to reset each user’s password if you disable this plugin. WordPress provides a link for requesting a new password on the login screen.
Also, you should leave the admin
user as a fallback, i.e. create a new account to use with this plugin. As long as you don’t edit the admin
profile, WordPress will store the password set when you installed WordPress.
In the worst case scenario, you may have to use phpMyAdmin or the MySQL command line to reset a user’s password.
Can I configure the plugin to support standard WordPress logins?
Yes. You can authenticate some users via an external, single sign-on system and other users via the built-in username and password combination. (Note: When mixed authentication is in use, this plugin does not scramble passwords as described above.)
Does this plugin support multisite (WordPress MU) setups?
Yes, you can enable this plugin across a network or on individual sites. However, options will need to be set on individual sites.
If you have suggestions on how to improve network support, please submit a comment.
ChangeLog