HEX
Server: Apache
System: Linux WWW 6.1.0-40-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.153-1 (2025-09-20) x86_64
User: web11 (1011)
PHP: 8.2.29
Disabled: NONE
Upload Files
File: /var/www/intranet.kauko.lt/wp-content/plugins/authldap/view/admin.phtml
<?php
/**
 * Copyright (c)2014-2014 heiglandreas
 *
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 * of this software and associated documentation files (the "Software"), to deal
 * in the Software without restriction, including without limitation the rights
 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 * copies of the Software, and to permit persons to whom the Software is
 * furnished to do so, subject to the following conditions:
 *
 * The above copyright notice and this permission notice shall be included in
 * all copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 * LIBILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
 * THE SOFTWARE.
 *
 * @category
 * @author    Andreas Heigl<andreas@heigl.org>
 * @copyright ©2014-2014 Andreas Heigl
 * @license   http://www.opesource.org/licenses/mit-license.php MIT-License
 * @version   0.0
 * @since     19.12.14
 * @link      https://github.com/heiglandreas/authLdap
 */
?><div class="wrap">
    <?php if (! extension_loaded('ldap')) : ?>
    <div class="error"><strong>Caveat:</strong> The LDAP-extension is not loaded!
        Without that extension it is not possible to query an LDAP-Server! Please have a look
        at <a href="http://php.net/manual/install.php">the PHP-Installation page</a>
    </div>
    <?php endif ?>
    <h2>AuthLDAP Options</h2>
    <form class="authldap-options" method="post" id="authLDAP_options" action="<?php echo $action;?>">
		<input name="authLdapNonce" type="hidden" value="<?php echo wp_create_nonce('authLdapNonce'); ?>" />
        <h3 class="title">General Usage of authLDAP</h3>
        <fieldset class="options">
            <table class="form-table">
                <tr>
                    <th>
                        <label for="authLDAPAuth">Enable Authentication via LDAP?</label>
                    </th>
                    <td>
                        <input type="checkbox" name="authLDAPAuth" id="authLDAPAuth" value="1"<?php echo $tChecked; ?>/>
                    </td>
                </tr>
                <tr>
                    <th>
                        <label for="authLDAPDebug">Debug AuthLDAP?</label>
                    </th>
                    <td>
                        <input type="checkbox" name="authLDAPDebug" id="authLDAPDebug" value="1"<?php echo $tDebugChecked; ?>/>
                    </td>
                </tr>
                <tr>
                    <th>
                        <label for="authLDAPDoNotOverwriteNonLdapUsers">Do not authenticate existing WordPress-Users</label>
                    </th>
                    <td>
                        <input type="checkbox" name="authLDAPDoNotOverwriteNonLdapUsers" id="authLDAPDoNotOverwriteNonLdapUsers" value="1"<?php echo $tDoNotOverwriteNonLdapUsers; ?>/>
                        <p class="description">
                            Shall we prohibit authenticating already in WordPress created users using LDAP? If you enable this, LDAP-Users with the same user-ID
                        as existing WordPress-Users can no longer take over the WordPress-Users account. This also means that LDAP-Users with the same User-ID as existing
                        WordPress-Users will <strong>not</strong> be able to authenticate anymore! Accounts that have been taken over already will not be affected by this setting.
                        </p>
                        <p class="description">This should only be checked if you know what you are doing!</p>
                    </td>
                </tr>
                <tr>
                    <th>
                        <label for="authLDAPCachePW">Save entered passwords in the WordPress user table?</label>
                    </th>
                    <td>
                        <input type="checkbox" name="authLDAPCachePW" id="authLDAPCachePW" value="1"<?php echo $tPWChecked; ?>/>
                    </td>
                </tr>
                <tr>
                    <th>
                        <label for="authLDAPGroupEnable">Map LDAP Groups to WordPress Roles?</label>
                    </th>
                    <td>
                        <input type="checkbox" name="authLDAPGroupEnable" id="authLDAPGroupEnable" value="1"<?php echo $tGroupChecked; ?>/>
                        <p class="description">
                            Search LDAP for user's groups and map to WordPress Roles.
                        </p>
                    </td>
                </tr>
            </table>
        </fieldset>
        <h3 class="title">General Server Settings</h3>
        <fieldset class="options">
            <table class="form-table">
                <tr>
                    <th>
                        <label for="authLDAPURI">LDAP URI</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPURI" id="authLDAPURI" placeholder="LDAP-URI"
                          class="regular-text" value="<?php echo esc_attr($authLDAPURI); ?>"/>
                        <p class="description">
                            The <abbr title="Uniform Ressource Identifier">URI</abbr>
                            for connecting to the LDAP-Server. This usualy takes the form
                            <var>&lt;scheme&gt;://&lt;user&gt;:&lt;password&gt;@&lt;server&gt;/&lt;path&gt;</var>
                            according to RFC 1738.</p>
                        <p class="description">
                            In this case it schould be something like
                            <var>ldap://uid=adminuser,dc=example,c=com:secret@ldap.example.com/dc=basePath,dc=example,c=com</var>.
                        </p>
                        <p class="description">
                            If your LDAP accepts anonymous login, you can ommit the user and
                            password-Part of the URI
                        </p>
                        <p class="description">
                            You can use the pseudo-schema <em>env</em> to provide your LDAP-URI from an environment-variable. So if you have your
                            LDAP-URI in a variable called <code>LDAP_URI</code> you can enter <code>env:LDAP_URI</code> in this field and at runtime the
                            appropriate value will be taken from the Environment-variable <code>LDAP_URI</code>. If the varialbe is not set, then the value will be empty.
                        </p>
                        <p class="description">
                            You can also provide different parts of the LDP-URI from environment variables by providing
                            <code>%env:[VARIABLENAME]%</code> within your LDAP-URI. So if you want to provide the
                            password from an Environment-variable <code>LDAP_PASSWORD</code> your LDAP-URI looks like
                            <code>ldap://uid=adminuser,dc=example,c=com:%env:LDAP_PASSWORD%@ldap.example.com/dc=basePath,dc=example,c=com</code>
                        </p>
                        <p class="description">
                            <strong>Caveat!</strong><br/>
                            If you are using Environment-variables for parts of the LDAP-URL then those <strong>must not</strong> be URL-Encoded!<br/>
                            Otherwise the different parts <strong>must</strong> be URL-Encoded!
                        </p>
                    </td>
                </tr>
                <tr>
                    <th>
                        <label for="authLDAPURISeparator">LDAP URI-Separator</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPURISeparator" id="authLDAPURISeparator" placeholder="LDAP-URI Separator"
                               class="regular-text" value="<?php echo esc_attr($authLDAPURISeparator); ?>"/>
                        <p class="description">
                            A separator that separates multiple LDAP-URIs from one another.
                            You can use that feature to try to authenticate against multiple LDAP-Servers
                            as long as they all have the same attribute-settings. The first LDAP-Server the user can
                            authenticate against will be used to handle the user.
                    </td>
                </tr>
                <tr>
                      <th>
                          <label for="authLDAPStartTLS" class="description">StartTLS</label>
                      </th>
                      <td>
                          <input type="checkbox" name="authLDAPStartTLS" id="authLDAPStartTLS" value="1"<?php echo esc_attr($tStartTLSChecked); ?>/>
                          <p class="description">
                              Use StartTLS for encryption of ldap connections. This setting is not to be used in combination with ldaps connections (ldap:// only).
                          </p>
                      </td>
                <tr>
                    <th scope="row">
                        <label for="authLDAPFilter" class="description">Filter</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPFilter" id="authLDAPFilter" placeholder="(uid=%s)"
                          class="regular-text" value="<?php echo esc_attr($authLDAPFilter); ?>"/>
                        <p class="description">
                            Please provide a valid filter that can be used for querying the
                            <abbr title="Lightweight Directory Access Protocol">LDAP</abbr>
                            for the correct user. For more information on this
                            feature have a look at <a href="http://andreas.heigl.org/cat/dev/wp/authldap">http://andreas.heigl.org/cat/dev/wp/authldap</a>
                        </p>
                        <p class="description">
                            This field <strong>should</strong> include the string <code>%s</code>
                            that will be replaced with the username provided during log-in
                        </p>
                        <p class="description">
                            If you leave this field empty it defaults to <strong>(uid=%s)</strong>
                        </p>
                    </td>
                </tr>
            </table>
        </fieldset>

        <h3 class="title">Settings for creating new Users</h3>
        <fieldset class="options">
            <table class="form-table">
                <tr>
                    <th scope="row">
                        <label for="authLDAPUseUserAccount">User-Read</label>
                    </th>
                    <td>
                        <input type="checkbox" name="authLDAPUseUserAccount" id="authLDAPUseUserAccount" value="1"<?php echo esc_attr($tUserRead); ?>/><br />
                        <p class="description">
                            If checked the plugin will use the user's account to query their own information. If not it will use the admin account.
                        </p>

                    </td>
                </tr>
				<tr>
                    <th scope="row">
                        <label for="authLDAPNameAttr">Name-Attribute</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPNameAttr" id="authLDAPNameAttr" placeholder="name"
                          class="regular-text" value="<?php echo esc_attr($authLDAPNameAttr); ?>"/><br />
                        <p class="description">
                            Which Attribute from the LDAP contains the Full or the First name
                            of the user trying to log in.
                        </p>
                        <p class="description">
                            This defaults to <strong>name</strong>
                        </p>

                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPSecName">Second Name Attribute</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPSecName" id="authLDAPSecName" placeholder=""
                          class="regular-text" value="<?php echo esc_attr($authLDAPSecName); ?>" />
                        <p class="description">
                            If the above Name-Attribute only contains the First Name of the
                            user you can here specify an Attribute that contains the second name.
                        </p>
                        <p class="description">
                            This field is empty by default
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPUidAttr">User-ID Attribute</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPUidAttr" id="authLDAPUidAttr" placeholder="uid"
                          class="regular-text" value="<?php echo esc_attr($authLDAPUidAttr); ?>" />
                        <p class="description">
                            Please give the Attribute, that is used to identify the user. This
                            should be the same as you used in the above <em>Filter</em>-Option
                        </p>
                        <p class="description">
                            This field defaults to <strong>uid</strong>
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPMailAttr">Mail Attribute</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPMailAttr" id="authLDAPMailAttr" placeholder="mail"
                          class="regular-text" value="<?php echo esc_attr($authLDAPMailAttr); ?>" />
                        <p class="description">
                            Which Attribute holds the eMail-Address of the user?
                        </p>
                        <p class="description">
                            If more than one eMail-Address are stored in the LDAP, only the first given is used
                        </p>
                        <p class="description">
                            This field defaults to <strong>mail</strong>
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPWebAttr">Web-Attribute</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPWebAttr" id="authLDAPWebAttr" placeholder=""
                          class="regular-text" value="<?php echo esc_attr($authLDAPWebAttr); ?>" />
                        <p class="description">
                            If your users have a personal page (URI) stored in the LDAP, it can
                            be provided here.
                        </p>
                        <p class="description">
                            This field is empty by default
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPDefaultRole">Default Role</label>
                    </th>
                    <td>
                        <select name="authLDAPDefaultRole" id="authLDAPDefaultRole">
                            <option value="" <?php echo ( $authLDAPDefaultRole == '' ? 'selected="selected"' : '' ); ?>>
                                None (deny access)
                            </option>
<?php foreach ($roles->get_names() as $group => $vals) : ?>
                            <option value="<?php echo $group; ?>" <?php echo ( $authLDAPDefaultRole == $group ? 'selected="selected"' : '' ); ?>>
                                <?php echo esc_attr($vals); ?>
                            </option>
<?php endforeach; ?>
                        </select>
                        <p class="description">
                            Here you can select the default role for users.
                            If you enable LDAP Groups below, they will take precedence over the Default Role.
                        </p>
                        <p class="description">
                            Existing users will retain their roles unless overriden by LDAP Groups below.
                        </p>
                    </td>
                </tr>
            </table>
        </fieldset>


        <div id="authldaprolemapping">
        <h3 class="title">Groups for Roles</h3>
        <fieldset class="options">
            <table class="form-table">
                <tr>
                    <th>
                        <label for="authLDAPGroupOverUser">LDAP Groups override role of existing users?</label>
                    </th>
                    <td>
                        <input type="checkbox" name="authLDAPGroupOverUser" id="authLDAPGroupOverUser" value="1"<?php echo esc_attr($tGroupOverUserChecked); ?>/>
                        <p class="description">
                            If role determined by LDAP Group differs from existing WordPress User's role, use LDAP Group.
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPGroupBase">Group-Base</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPGroupBase" id="authLDAPGroupBase" placeholder=""
                          class="regular-text" value="<?php echo esc_attr($authLDAPGroupBase); ?>" />
                        <p class="description">
                            This is the base dn to lookup groups.
                        </p>
                        <p class="description">
                            If empty the base dn of the LDAP URI will be used
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPGroupAttr">Group-Attribute</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPGroupAttr" id="authLDAPGroupAttr" placeholder="gidNumber"
                          class="regular-text" value="<?php echo esc_attr($authLDAPGroupAttr); ?>" />
                        <p class="description">
                            This is the attribute that defines the Group-ID that can be matched
                            against the Groups defined further down
                        </p>
                        <p class="description">
                            This field defaults to <strong>gidNumber</strong>
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPGroupSeparator">Group-Separator</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPGroupSeparator" id="authLDAPGroupSeparator" placeholder=","
                          class="regular-text" value="<?php echo esc_attr($authLDAPGroupSeparator); ?>" />
                        <p class="description">
                            This attribute defines the separator used for the Group-IDs listed in the
                            Groups defined further down. This is useful if the value of Group-Attribute
                            listed above can contain a comma (for example, when using the memberof attribute)
                        </p>
                        <p class="description">
                            This field defaults to <strong>, (comma)</strong>
                        </p>
                    </td>
                </tr>
                <tr>
                    <th scope="row">
                        <label for="authLDAPGroupFilter">Group-Filter</label>
                    </th>
                    <td>
                        <input type="text" name="authLDAPGroupFilter" id="authLDAPGroupFilter"
                          placeholder="(&amp;(objectClass=posixGroup)(memberUid=%s))"
                          class="regular-text" value="<?php echo esc_attr($authLDAPGroupFilter); ?>" />
                        <p class="description">
                            Here you can add the filter for selecting groups for ther
                            currentlly logged in user
                        </p>
                        <p class="description">
                            The Filter should contain the string <code>%s</code> which will be replaced by
                            the login-name of the currently logged in user
                        </p>
                        <p class="description">
                            Alternatively the string <code>%dn%</code> will be replaced by the
                            DN of the currently logged in user. This can be helpfull if
                            group-memberships are defined with DNs rather than UIDs
                        </p>
                        <p class="description">This field defaults to
                            <strong>(&amp;(objectClass=posixGroup)(memberUid=%s))</strong>
                        </p>
                    </td>
                </tr>
            </table>
        </fieldset>

        <h3 class="title">Role - group mapping</h3>
        <fieldset class="options">
            <p class="description">You can set multiple values per role by separating them with a coma</p>
            <p class="description">The values are empty by default</p>
            <table class="form-table">
                <thead>
                    <th scope="row">Assign this WordPress-Role</th>
                    <th style="width:auto;">to members of this/these LDAP-Groups</th>
                </thead>
                <tbody>
<?php
    foreach ($roles->get_names() as $group => $vals) :
        $aGroup=$authLDAPGroups[$group]; ?>
                <tr>
                    <th scope="row" style="width:auto; min-width: 200px;">
                        <label for="authLDAPGroups[<?php echo $group; ?>]">
                            <?php echo esc_attr($vals); ?>
                        </label>
                    </th>
                    <td>
						<textarea name="authLDAPGroups[<?php echo $group; ?>]" id="authLDAPGroups[<?php echo $group; ?>]" cols=60 rows=5><?php
							echo esc_textarea($aGroup);
						?></textarea>
                    </td>
                </tr>
<?php endforeach; ?>
                </tbody>
            </table>
        </fieldset>
            </div>
        <fieldset class="buttons">
            <p class="submit">
                <input type="submit" name="ldapOptionsSave" class="button button-primary" value="Save Changes" />
            </p>
        </fieldset>
    </form>
</div>

<script type="text/javascript">
    elem = document.getElementById('authLDAPGroupEnable');
    if(! elem.checked) {
        document.getElementById('authldaprolemapping').setAttribute('style', 'display:none;');
    }

    elem.addEventListener('change', function(e){
        if(! e.target.checked) {
            document.getElementById('authldaprolemapping').setAttribute('style', 'display:none;');
        } else {
            document.getElementById('authldaprolemapping').removeAttribute('style');
        }
    });

</script>