======================================= LDAP Single Sign-On ======================================= To use the single sign-on feature, your web server must provide an authentication mechanism for LDAP. The only authentication mechanism used in development was mod_auth_sspi for Apache/Windows, but so long as the web server's LDAP authentication mechanism is configured to provide the $_SERVER variable $_SERVER['REMOTE_USER'] or $_SERVER['REDIRECT_REMOTE_USER'] corresponding directly to a user's LDAP user name, this should work all the same. This will require some sort of LDAP authentication mechanism; mod_auth_sspi is available here: http://mod-auth-sspi.sourceforge.net/, while mod_ntlm is available here: http://modntlm.sourceforge.net/, and mod_auth_ntlm_winbind is available here: http://samba.org/ftp/unpacked/lorikeet/mod_auth_ntlm_winbind/. If a Linux distribution is being used, Apache authentication modules are likely available within the distro's package manager. Unless an administrator wishes to require that all visitors be authenticated, NTLM and/or basic authentication should be set up only on the path user/login/sso, which will authentify the visitor but not deny access to view the site if the visitor is not authenticated. An administrator may wish to require LDAP authentication to view any portion of the site; this can be achieved by changing the location directive below to "/". An administrator may also wish to automatically log in visitors to Drupal; this can be achieved by checking "Turn on automated single sign-on" in the modules' configuration page. An example of an Apache configuration for a named virtualhost configuration using mod_auth_sspi on Windows is as follows: httpd.conf: _______________________________________________________________________________ _______________________________________________________________________________ # Virtual hosts Include conf/extra/httpd-vhosts.conf # Pass NTLM authentication to Apache LoadModule sspi_auth_module modules/mod_auth_sspi.so LoadModule sspi_auth_module modules/mod_auth_sspi.so _______________________________________________________________________________ _______________________________________________________________________________ httpd-vhosts.conf: _______________________________________________________________________________ _______________________________________________________________________________ NameVirtualHost example.com DocumentRoot "D:/www/example.com/htdocs" ServerName example.com Options Indexes FollowSymLinks MultiViews AllowOverride All Order Allow,Deny Allow from all AuthType SSPI AuthName "Example.com - Login using your LDAP user name and password" SSPIAuth On SSPIAuthoritative On ### The domain used to authenticate with LDAP; this should match the domain ### configured in the LDAP integration configuration within Drupal SSPIDomain ad.example.com SSPIOmitDomain On SSPIOfferBasic On Require valid-user #SSPIBasicPreferred On #SSPIofferSSPI off _______________________________________________________________________________ _______________________________________________________________________________ After enabling and configuring an LDAP authentication module within Apache, visit user/login/sso in the Drupal installation on example.com. With or without the ldap sso feature enabled, the browser should prompt for a user name and password if using Internet Explorer 8 or a non-Microsoft browser. Internet Explorer 7 by default will pass NTLM authentication credentials to local websites, and IE8 and Firefox can be configured to do this as well. If prompted for credentials on that path, enter a valid LDAP user name, omitting the domain if "SSPIOmitDomain On" is configured, as well as a password. If the credentials are correct, or if NTLM credentials are passed automatically by the browser and successfully authenticated, a Drupal 404 "Page not found" message will be displayed if the module is not enabled; an "access is denied" message will be displayed if the module is enabled and the browser is already logged in; and if the ldap_sso module is fully configured and there is no existing session, the browser will display the message "You have been successfully authenticated" after redirecting to the sites' home page if you have checked "Notify user of successful authentication".