From: Art Cancro
Date: Sat, 27 Mar 2004 02:21:32 +0000 (+0000)
Subject: *** empty log message ***
X-Git-Tag: v7.86~5498
X-Git-Url: https://code.citadel.org/?a=commitdiff_plain;h=c31a166cf5678a1edae2cf1691fac32ea90e5f50;p=citadel.git
*** empty log message ***
---
diff --git a/citadel/docs/citadel.html b/citadel/docs/citadel.html
index 063100d58..a3c33af6f 100644
--- a/citadel/docs/citadel.html
+++ b/citadel/docs/citadel.html
@@ -1934,7 +1934,12 @@ Citadel system.
In order to prevent "just anyone" from subscribing to any room on
your system, there is a setting in the .Aide Edit
room command:
-CitaNews} . Aide Edit this room
Room name [CitaNews]:
(lots of other stuff omitted for brevity...)
Self-service list subscribe/unsubscribe [No]: Yes
+CitaNews} . Aide Edit this room
+Room name [CitaNews]:
+
+(lots of other stuff omitted for brevity...)
+
+Self-service list subscribe/unsubscribe [No]: Yes
When you answer "Yes" to self-service list subscribe/unsubscribe,
you are
enabling that feature. Now, all you have to do is tell the world about
@@ -2357,9 +2362,64 @@ and running before you attempt to connect Citadel to it.
Configuring the
LDAP Connector for Citadel
-FIXME finish writing this
+Once you've located or installed your LDAP server, connecting Citadel
+to it is easily completed with the .Aide System-configuration
+General command:
+
+Lobby> . Aide System configuration General
(lots of other stuff omitted for brevity...)
Connect this Citadel to an LDAP directory [Yes]: Yes
Host name of LDAP server []: 127.0.0.1
Port number of LDAP service [389]: 389
Base DN []: dc=servername,dc=domain,dc=org
Bind DN []: cn=manager,dc=servername,dc=domain,dc=org
Password for bind DN []: secret
(more questions omitted...)
Save this configuration? Yes
+Once you've done this, restart your Citadel service with the .Aide Terminate-server
+Now command. When
+Citadel restarts, it will connect to your LDAP directory. Note
+that we gave Citadel the same Base DN, Bind DN, and password that was
+in our LDAP server configuration example. Obviously, everything
+needs to be identical on both sides or the connection will be
+refused. 127.0.0.1 is the loopback address, and 389 is the
+standard port number for LDAP, so this would be the proper host and
+port combination for an LDAP service running on your local
+server. It could just as easily be on another server, for example
+an organization-wide directory server.
+
+You can also configure the LDAP Connector for Citadel from a WebCit
+session. Log on as an Aide and click on Advanced Options -->
+Edit Site-Wide Configuration --> Directory, and you will be
+presented with the same set of questions.
+
+So, what kind of information will be entered into LDAP? As a
+rule, anything that gets saved to your Global Address Book room will
+also be saved to LDAP. Citadel will set up OU's (Organizational
+Units) for each node on your Citadel network, so if you are running
+multiple Citadel servers in an organization, you will automatically
+have a hierarchial view built for you. Below the OU's will be an
+entry for each user who has a vCard registered on the system.
+Citadel automatically translates vCard information to LDAP.
+If you already have a Global Address Book full of existing information,
+you can execute an IGAB
+(Initialize Global Address Book) server command to rebuild it. In
+addition to performing its usual function of rebuilding the internal
+Internet e-mail address mapping table, Citadel will also repopulate
+LDAP with all existing vCards. You should be aware, however, that
+existing LDAP entries will not be cleared from your directory
+server. If your directory contains only Citadel data, you can
+safely delete your database and start over, because it will be
+repopulated. Otherwise, Citadel will merely update any existing
+records with fresh information.
+The LDAP Connector for Citadel is a recent development, so expect more
+functionality in this space in the near future.