diff --git a/app/Console/Commands/LdapSync.php b/app/Console/Commands/LdapSync.php index fe264280e..f3c0a79e6 100755 --- a/app/Console/Commands/LdapSync.php +++ b/app/Console/Commands/LdapSync.php @@ -49,7 +49,7 @@ class LdapSync extends Command $ldap_result_last_name = Setting::getSettings()->ldap_lname_field; $ldap_result_first_name = Setting::getSettings()->ldap_fname_field; - $ldap_result_active_flag = Setting::getSettings()->ldap_active_flag_field; + $ldap_result_active_flag = Setting::getSettings()->ldap_active_flag; $ldap_result_emp_num = Setting::getSettings()->ldap_emp_num; $ldap_result_email = Setting::getSettings()->ldap_email; $ldap_result_phone = Setting::getSettings()->ldap_phone_field; @@ -176,7 +176,6 @@ class LdapSync extends Command $pass = bcrypt($tmp_pass); for ($i = 0; $i < $results['count']; $i++) { - if (empty($ldap_result_active_flag) || $results[$i][$ldap_result_active_flag][0] == 'TRUE') { $item = []; $item['username'] = isset($results[$i][$ldap_result_username][0]) ? $results[$i][$ldap_result_username][0] : ''; $item['employee_number'] = isset($results[$i][$ldap_result_emp_num][0]) ? $results[$i][$ldap_result_emp_num][0] : ''; @@ -203,7 +202,7 @@ class LdapSync extends Command // Creating a new user. $user = new User; $user->password = $pass; - $user->activated = 0; + $user->activated = 1; // newly created users can log in by default, unless AD's UAC is in use, or an active flag is set (below) $item['createorupdate'] = 'created'; } @@ -229,8 +228,21 @@ class LdapSync extends Command // Sync activated state for Active Directory. - if (array_key_exists('useraccountcontrol', $results[$i])) { - /* The following is _probably_ the correct logic, but we can't use it because + if ( !empty($ldap_result_active_flag)) { // IF we have an 'active' flag set.... + // ....then *most* things that are truthy will activate the user. Anything falsey will deactivate them. + // (Specifically, we don't handle a value of '0.0' correctly) + $raw_value = @$results[$i][$ldap_result_active_flag][0]; + $filter_var = filter_var($raw_value, FILTER_VALIDATE_BOOLEAN, FILTER_NULL_ON_FAILURE); + $boolean_cast = (bool)$raw_value; + + $user->activated = $filter_var ?? $boolean_cast; // if filter_var() was true or false, use that. If it's null, use the $boolean_cast + + } elseif (array_key_exists('useraccountcontrol', $results[$i]) ) { + // ....otherwise, (ie if no 'active' LDAP flag is defined), IF the UAC setting exists, + // ....then use the UAC setting on the account to determine can-log-in vs. cannot-log-in + + + /* The following is _probably_ the correct logic, but we can't use it because some users may have been dependent upon the previous behavior, and this could cause additional access to be available to users they don't want to allow to log in. @@ -260,12 +272,11 @@ class LdapSync extends Command '1049088', // 0x100200 NORMAL_ACCOUNT, NOT_DELEGATED ]; $user->activated = (in_array($results[$i]['useraccountcontrol'][0], $enabled_accounts)) ? 1 : 0; - } // If we're not using AD, and there isn't an activated flag set, activate all users - elseif (empty($ldap_result_active_flag)) { - $user->activated = 1; - } + } /* implied 'else' here - leave the $user->activated flag alone. Newly-created accounts will be active. + already-existing accounts will be however the administrator has set them */ + if ($item['ldap_location_override'] == true) { $user->location_id = $item['location_id']; @@ -293,7 +304,6 @@ class LdapSync extends Command } array_push($summary, $item); - } } if ($this->option('summary')) {