settings = $this->get_settings_obj( $this->prefix ); if( $this->get_setting('directory') == "ad" ) { require_once( plugin_dir_path(__FILE__) . "/includes/adLDAP.php" ); $this->adldap = new adLDAP( array ( "account_suffix" => $this->get_setting('account_suffix'), "use_tls" => str_true( $this->get_setting('use_tls') ), "base_dn" => $this->get_setting('base_dn'), "domain_controllers" => (array)$this->get_setting('domain_controllers'), "ad_port" => $this->get_setting('ldap_port') ) ); } add_action('admin_init', array($this, 'save_settings') ); add_action('admin_menu', array($this, 'menu') ); if ( str_true($this->get_setting('enabled')) ) { add_filter('authenticate', array($this, 'authenticate'), 1, 3); } register_activation_hook( __FILE__, array($this, 'activate') ); // If version is false, and old version detected, run activation if( $this->get_setting('version') === false || get_option('simpleldap_domain_controllers', false) !== false ) $this->activate(); } public static function getInstance () { if ( !self::$instance ) { self::$instance = new self; } return self::$instance; } function activate () { // Default settings $this->add_setting('account_suffix', "@mydomain.org"); $this->add_setting('base_dn', "DC=mydomain,DC=org"); $this->add_setting('domain_controllers', array("dc01.mydomain.local") ); $this->add_setting('directory', "ad"); $this->add_setting('role', "Contributor"); $this->add_setting('high_security', "true"); $this->add_setting('ol_login', "uid"); $this->add_setting('use_tls', "false"); $this->add_setting('ldap_port', 389); $this->add_setting('ldap_version', 3); $this->add_setting('create_users', "false"); $this->add_setting('enabled', "false"); if( $this->get_setting('version') === false ) { $this->set_setting('version', '1.5'); $this->set_setting('enabled', 'true'); if ( $this->set_setting('account_suffix', get_option('simpleldap_account_suffix')) ) { //delete_option('simpleldap_account_suffix'); } if ( $this->set_setting('base_dn', get_option('simpleldap_base_dn')) ) { //delete_option('simpleldap_base_dn'); } if ( $this->set_setting('domain_controllers', get_option('simpleldap_domain_controllers')) ) { //delete_option('simpleldap_domain_controllers'); } $directory_result = false; if ( get_option('simpleldap_directory_type') == "directory_ad" ) { $directory_result = $this->set_setting('directory', 'ad'); } else { $directory_result = $this->set_setting('directory', 'ol'); } //if( $directory_result ) delete_option('simpleldap_directory_type'); unset($directory_result); if ( $this->set_setting('groups', (array)get_option('simpleldap_group') ) ) { //delete_option('simpleldap_group'); } if ( $this->set_setting('role', get_option('simpleldap_account_type')) ) { //delete_option('simpleldap_account_type'); } if ( $this->set_setting('ol_login', get_option('simpleldap_ol_login')) ) { //delete_option('simpleldap_ol_login'); } if ( $this->set_setting('use_tls', str_true( get_option('simpleldap_use_tls') ) ) ) { //delete_option('simpleldap_use_tls'); } $create_users = false; if ( get_option('simpleldap_login_mode') == "mode_create_all" || get_option('simpleldap_login_mode') == "mode_create_group" ) { $create_users = true; } if ( $this->set_setting('create_users', $create_users) ) { //delete_option('simpleldap_login_mode'); } $high_security = false; if ( get_option('simpleldap_security_mode') == "security_high" ) { $high_security = true; } if ( $this->set_setting('high_security', $high_security) ) { //delete_option('simpleldap_security_mode'); } } } function menu () { add_options_page("Simple LDAP Login", "Simple LDAP Login", 'manage_options', "simple-ldap-login", array($this, 'admin_page') ); } function admin_page () { include 'Simple-LDAP-Login-Admin.php'; } function get_settings_obj () { return get_option("{$this->prefix}settings", false); } function set_settings_obj ( $newobj ) { return update_option("{$this->prefix}settings", $newobj); } function set_setting ( $option = false, $newvalue ) { if( $option === false ) return false; $this->settings = $this->get_settings_obj($this->prefix); $this->settings[$option] = $newvalue; return $this->set_settings_obj($this->settings); } function get_setting ( $option = false ) { if($option === false || ! isset($this->settings[$option]) ) return false; return apply_filters($this->prefix . 'get_setting', $this->settings[$option], $option); } function add_setting ( $option = false, $newvalue ) { if($option === false ) return false; if ( ! isset($this->settings[$option]) ) { return $this->set_setting($option, $newvalue); } else return false; } function get_field_name($setting, $type = 'string') { return "{$this->prefix}setting[$setting][$type]"; } function save_settings() { if( isset($_REQUEST["{$this->prefix}setting"]) && check_admin_referer('save_sll_settings','save_the_sll') ) { $new_settings = $_REQUEST["{$this->prefix}setting"]; foreach( $new_settings as $setting_name => $setting_value ) { foreach( $setting_value as $type => $value ) { if( $type == "array" ) { $this->set_setting($setting_name, explode(";", $value)); } else { $this->set_setting($setting_name, $value); } } } add_action('admin_notices', array($this, 'saved_admin_notice') ); } } function saved_admin_notice(){ echo '

Simple LDAP Login settings have been saved.

'; if( ! str_true($this->get_setting('enabled')) ) { echo '

Simple LDAP Login is disabled.

'; } } function authenticate ($user, $username, $password) { // If previous authentication succeeded, respect that if ( is_a($user, 'WP_User') ) { return $user; } // Determine if user a local admin $local_admin = false; $user_obj = get_user_by('login', $username); if( user_can($user_obj, 'update_core') ) $local_admin = true; if ( empty($username) || empty($password) ) { $error = new WP_Error(); if ( empty($username) ) $error->add('empty_username', __('ERROR: The username field is empty.')); if ( empty($password) ) $error->add('empty_password', __('ERROR: The password field is empty.')); return $error; } // If high security mode is enabled, remove default WP authentication hook if ( str_true( $this->get_setting('high_security') ) && ! $local_admin ) { remove_filter('authenticate', 'wp_authenticate_username_password', 20, 3); } // Sweet, let's try to authenticate our user and pass against LDAP $auth_result = $this->ldap_auth($username, $password, $this->get_setting('directory') ); if( $auth_result ) { // Authenticated, does user have required groups, if any? if( $this->user_has_groups( $username, $this->get_setting('directory') ) ) { $user = get_user_by('login', $username); if ( ! $user || ( strtolower($user->user_login) !== strtolower($username) ) ) { if( ! str_true($this->get_setting('create_users')) ) { do_action( 'wp_login_failed', $username ); return new WP_Error('invalid_username', __('Simple LDAP Login Error: LDAP credentials are correct, but there is no matching WordPress user and user creation is not enabled.')); } $new_user = wp_insert_user( $this->get_user_data( $username, $this->get_setting('directory') ) ); if( ! is_wp_error($new_user) ) { // Successful Login $new_user = new WP_User($new_user); do_action_ref_array($this->prefix . 'auth_success', array($new_user) ); return $new_user; } else { do_action( 'wp_login_failed', $username ); return new WP_Error("{$this->prefix}login_error", __('Simple LDAP Login Error: LDAP credentials are correct and user creation is allowed but an error occurred creating the user in WordPress. Actual error: '.$new_user->get_error_message() )); } } else { return new WP_User($user->ID); } } else { return new WP_Error("{$this->prefix}login_error", __('Simple LDAP Login Error: Your LDAP credentials are correct, but you are not in an authorized LDAP group.')); } } elseif ( str_true($this->get_setting('high_security')) ) { return new WP_Error('invalid_username', __('Simple LDAP Login: Simple LDAP Login could not authenticate your credentials. The security settings do not permit trying the WordPress user database as a fallback.')); } do_action($this->prefix . 'auth_failure'); return false; } function ldap_auth( $username, $password, $directory ) { $result = false; if ( $directory == "ad" ) { $result = $this->adldap->authenticate( $username, $password ); } elseif ( $directory == "ol" ) { $this->ldap = ldap_connect( join(' ', (array)$this->get_setting('domain_controllers')), (int)$this->get_setting('ldap_port') ); ldap_set_option($this->ldap, LDAP_OPT_PROTOCOL_VERSION, (int)$this->get_setting('ldap_version')); if ( str_true($this->get_setting('use_tls')) ) { ldap_start_tls($this->ldap); } $ldapbind = @ldap_bind($this->ldap, $this->get_setting('ol_login') .'=' . $username . ',' . $this->get_setting('base_dn'), $password); $result = $ldapbind; } return apply_filters($this->prefix . 'ldap_auth', $result); } function user_has_groups( $username = false, $directory ) { $result = false; $groups = (array)$this->get_setting('groups'); $groups = array_filter($groups); if ( ! $username ) return $result; if ( count( $groups ) == 0 ) return true; if ( $directory == "ad" ) { foreach ($groups as $gp) { if ( $this->adldap->user_ingroup ($username, $gp ) ) { $result = true; break; } } } elseif ( $directory == "ol" ) { if( $this->ldap === false ) return false; $result = ldap_search($this->ldap, $this->get_setting('base_dn'), '(' . $this->get_setting('ol_login') . '=' . $username . ')', array('cn')); $ldapgroups = ldap_get_entries($this->ldap, $result); // Ok, we should have the user, all the info, including which groups he is a member of. // Let's make sure he's in the right group before proceeding. $user_groups = array(); for ( $i = 0; $i < $ldapgroups['count']; $i++) { $user_groups[] .= $ldapgroups[$i]['cn'][0]; } $result = (bool)(count( array_intersect($user_groups, $groups) ) > 0); } return apply_filters($this->prefix . 'user_has_groups', $result); } function get_user_data( $username, $directory ) { $user_data = array( 'user_pass' => md5( microtime() ), 'user_login' => $username, 'user_nicename' => '', 'user_email' => '', 'display_name' => '', 'first_name' => '', 'last_name' => '', 'role' => $this->get_setting('role') ); if ( $directory == "ad" ) { $userinfo = $this->adldap->user_info($username, array("samaccountname","givenname","sn","mail")); $userinfo = $userinfo[0]; } elseif ( $directory == "ol" ) { if ( $this->ldap == null ) {return false;} $result = ldap_search($this->ldap, $this->get_setting('base_dn'), '(' . $this->get_setting('ol_login') . '=' . $username . ')', array($this->get_setting('ol_login'), 'sn', 'givenname', 'mail')); $userinfo = ldap_get_entries($this->ldap, $result); if ($userinfo['count'] == 1) { $userinfo = $userinfo[0]; } } else return false; if( is_array($userinfo) ) { $user_data['user_nicename'] = $userinfo['givenname'][0] . ' ' . $userinfo['sn'][0]; $user_data['user_email'] = $userinfo['mail'][0]; $user_data['display_name'] = $user_data['user_nicename']; $user_data['first_name'] = $userinfo['givenname'][0]; $user_data['last_name'] = $userinfo['sn'][0]; } return apply_filters($this->prefix . 'user_data', $user_data); } } if ( ! function_exists('str_true') ) { /** * Evaluates natural language strings to boolean equivalent * * Used primarily for handling boolean text provided in shopp() tag options. * All values defined as true will return true, anything else is false. * * Boolean values will be passed through. * * Replaces the 1.0-1.1 value_is_true() * * @author Jonathan Davis * @since 1.2 * * @param string $string The natural language value * @param array $istrue A list strings that are true * @return boolean The boolean value of the provided text **/ function str_true ( $string, $istrue = array('yes', 'y', 'true','1','on','open') ) { if (is_array($string)) return false; if (is_bool($string)) return $string; return in_array(strtolower($string),$istrue); } } $SimpleLDAPLogin = SimpleLDAPLogin::getInstance();