\OCP\Util::writeLog('user_ldap', 'Error when searching: '.ldap_error($link_resource).' code '.ldap_errno($link_resource), \OCP\Util::ERROR);
\OCP\Util::writeLog('user_ldap',
'Error when searching: '.ldap_error($link_resource).' code '.ldap_errno($link_resource),
\OCP\Util::ERROR);
\OCP\Util::writeLog('user_ldap', 'Attempt for Paging? '.print_r($pagedSearchOK, true), \OCP\Util::ERROR);
return array();
}
@ -668,7 +674,9 @@ abstract class Access {
if($skipHandling) {
return;
}
//if count is bigger, then the server does not support paged search. Instead, he did a normal search. We set a flag here, so the callee knows how to deal with it.
// if count is bigger, then the server does not support
// paged search. Instead, he did a normal search. We set a
// flag here, so the callee knows how to deal with it.
//no cookie known, although the offset is not 0. Maybe cache run out. We need to start all over *sigh* (btw, Dear Reader, did you need LDAP paged searching was designed by MSFT?)
// no cookie known, although the offset is not 0. Maybe cache run out. We need
// to start all over *sigh* (btw, Dear Reader, did you need LDAP paged
\OCP\Util::writeLog('user_ldap', 'Either no password given for the user agent or a password is given, but no LDAP agent; won`t connect.', \OCP\Util::WARN);
\OCP\Util::writeLog('user_ldap',
'Either no password given for the user agent or a password is given, but no LDAP agent; won`t connect.',
<p><labelfor="ldap_host"><?phpecho$l->t('Host');?></label><inputtype="text"id="ldap_host"name="ldap_host"data-default="<?phpecho$_['ldap_host_default'];?>"title="<?phpecho$l->t('You can omit the protocol, except you require SSL. Then start with ldaps://');?>"></p>
<p><labelfor="ldap_base"><?phpecho$l->t('Base DN');?></label><textareaid="ldap_base"name="ldap_base"placeholder="<?phpecho$l->t('One Base DN per line');?>"title="<?phpecho$l->t('You can specify Base DN for users and groups in the Advanced tab');?>"data-default="<?phpecho$_['ldap_base_default'];?>"></textarea></p>
<p><labelfor="ldap_dn"><?phpecho$l->t('User DN');?></label><inputtype="text"id="ldap_dn"name="ldap_dn"data-default="<?phpecho$_['ldap_dn_default'];?>"title="<?phpecho$l->t('The DN of the client user with which the bind shall be done, e.g. uid=agent,dc=example,dc=com. For anonymous access, leave DN and Password empty.');?>"/></p>
<p><labelfor="ldap_agent_password"><?phpecho$l->t('Password');?></label><inputtype="password"id="ldap_agent_password"name="ldap_agent_password"data-default="<?phpecho$_['ldap_agent_password_default'];?>"title="<?phpecho$l->t('For anonymous access, leave DN and Password empty.');?>"/></p>
<p><labelfor="ldap_login_filter"><?phpecho$l->t('User Login Filter');?></label><inputtype="text"id="ldap_login_filter"name="ldap_login_filter"data-default="<?phpecho$_['ldap_login_filter_default'];?>"title="<?phpecho$l->t('Defines the filter to apply, when login is attempted. %%uid replaces the username in the login action.');?>"/><br/><small><?phpecho$l->t('use %%uid placeholder, e.g. "uid=%%uid"');?></small></p>
<p><labelfor="ldap_userlist_filter"><?phpecho$l->t('User List Filter');?></label><inputtype="text"id="ldap_userlist_filter"name="ldap_userlist_filter"data-default="<?phpecho$_['ldap_userlist_filter_default'];?>"title="<?phpecho$l->t('Defines the filter to apply, when retrieving users.');?>"/><br/><small><?phpecho$l->t('without any placeholder, e.g. "objectClass=person".');?></small></p>
<p><labelfor="ldap_group_filter"><?phpecho$l->t('Group Filter');?></label><inputtype="text"id="ldap_group_filter"name="ldap_group_filter"data-default="<?phpecho$_['ldap_group_filter_default'];?>"title="<?phpecho$l->t('Defines the filter to apply, when retrieving groups.');?>"/><br/><small><?phpecho$l->t('without any placeholder, e.g. "objectClass=posixGroup".');?></small></p>
title="<?phpecho$l->t('The DN of the client user with which the bind shall be done, e.g. uid=agent,dc=example,dc=com. For anonymous access, leave DN and Password empty.');?>" /></p>