OTRS 6 - AD integration - Domain Admin users mapped as Agents, not as OTRS AdminsLDAP based virtual domain set-up for DovecotMake Postfix local(8) tempfail on LDAP outagepasswd for ldap usersConnecting a linux client into active directoryNeed help understanding PAM directivesHow to use PAM to check LDAP password for some users, yet always use UID/GIDs from local files?Auth fail on Samba server with LDAP backend‏OTRS authenticating with LDAP, how to get ALL UsersOpenLDAP: Index to olcDatabase not respectedGitlab ladp integration authentication Error

How to increase the size of the cursor in Lubuntu 19.04?

What exactly are the `size issues' preventing formation of presheaves being a left adjoint to some forgetful functor?

29er Road Tire?

Something that can be activated/enabled

Why wasn't the Night King naked in S08E03?

How do LIGO and VIRGO know that a gravitational wave has its origin in a neutron star or a black hole?

My advisor talks about me to his colleague

In Stroustrup's example, what does this colon mean in `return 1 : 2`? It's not a label or ternary operator

Should I dumb down my writing in a foreign country?

What is a smasher?

What does "Managed by Windows" do in the Power options for network connection?

Did the manned NASA capsules rotate during descent?

List of newcommands used

Upside-Down Pyramid Addition...REVERSED!

When two pilots are required for a private aircraft, is it a requirement for the PIC to be ATPL?

exec command in bash loop

Has a commercial or military jet bi-plane ever been manufactured?

What to use instead of cling film to wrap pastry

Did we get closer to another plane than we were supposed to, or was the pilot just protecting our delicate sensibilities?

Identifying characters

How I can I roll a number of non-digital dice to get a random number between 1 and 150?

How can I roleplay a follower-type character when I as a player have a leader-type personality?

Find the cheapest shipping option based on item weight

Do I add my skill check modifier to the roll of 15 granted by Glibness?



OTRS 6 - AD integration - Domain Admin users mapped as Agents, not as OTRS Admins


LDAP based virtual domain set-up for DovecotMake Postfix local(8) tempfail on LDAP outagepasswd for ldap usersConnecting a linux client into active directoryNeed help understanding PAM directivesHow to use PAM to check LDAP password for some users, yet always use UID/GIDs from local files?Auth fail on Samba server with LDAP backend‏OTRS authenticating with LDAP, how to get ALL UsersOpenLDAP: Index to olcDatabase not respectedGitlab ladp integration authentication Error






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








1















I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



My (redacted) Config.pm:



 $Self->'AuthModule' = 'Kernel::System::Auth::LDAP';


### OTRS Admin Auth
###
$Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
$Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
$Self->'AuthModule::LDAP::AccessAttr' = 'member';
$Self->'AuthModule::LDAP::UserAttr' = 'DN';
$Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
$Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
$Self->'AuthModule::LDAP::AlwaysFilter' = '';
$Self->'AuthModule::LDAP::Params' =
port => 389,
timeout => 120,
async => 0,
version => 3,
sscope => 'sub'
;

### User Sync
### AD <==> DB OTRS (MySQL)
$Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
$Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
$Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->'AuthSyncModule::LDAP::UserSyncMap' =
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
;

$Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
'users', 'basic_admin',
];
$Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
$Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
$Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
$Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->CustomerUser =
Module => 'Kernel::System::CustomerUser::LDAP',
Params =>
Host => '192.168.179.2', # AD Server
BaseDN => 'dc=test,DC=local', #Domain
SSCOPE => 'sub',
UserDN =>'svc_otrs', #OTRS Service User
UserPw => 'Passw0rd', #its password
AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
SourceCharset => 'utf-8',
DestCharset => 'utf-8',
,

CustomerKey => 'sAMAccountName',
CustomerID => 'mail',
CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchPrefix => '',
CustomerUserSearchSuffix => '*',
CustomerUserSearchListLimit => 10000,
CustomerUserPostMasterSearchFields => ['mail'],
CustomerUserNameFields => ['givenname', 'sn'],
Map => [
# note: Login, Email and CustomerID needed!
#[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
[ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
[ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
[ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
[ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
[ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
[ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
#[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
#[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
],
;









share|improve this question






























    1















    I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



    I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



    After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



    What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



    The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



    My (redacted) Config.pm:



     $Self->'AuthModule' = 'Kernel::System::Auth::LDAP';


    ### OTRS Admin Auth
    ###
    $Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
    $Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
    $Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
    $Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
    $Self->'AuthModule::LDAP::AccessAttr' = 'member';
    $Self->'AuthModule::LDAP::UserAttr' = 'DN';
    $Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
    $Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
    $Self->'AuthModule::LDAP::AlwaysFilter' = '';
    $Self->'AuthModule::LDAP::Params' =
    port => 389,
    timeout => 120,
    async => 0,
    version => 3,
    sscope => 'sub'
    ;

    ### User Sync
    ### AD <==> DB OTRS (MySQL)
    $Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
    $Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
    $Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
    $Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
    $Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
    $Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
    $Self->'AuthSyncModule::LDAP::UserSyncMap' =
    # DB -> LDAP
    UserFirstname => 'givenName',
    UserLastname => 'sn',
    UserEmail => 'mail',
    ;

    $Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
    'users', 'basic_admin',
    ];
    $Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
    $Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
    $Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
    $Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
    $Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
    $Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
    $Self->CustomerUser =
    Module => 'Kernel::System::CustomerUser::LDAP',
    Params =>
    Host => '192.168.179.2', # AD Server
    BaseDN => 'dc=test,DC=local', #Domain
    SSCOPE => 'sub',
    UserDN =>'svc_otrs', #OTRS Service User
    UserPw => 'Passw0rd', #its password
    AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
    SourceCharset => 'utf-8',
    DestCharset => 'utf-8',
    ,

    CustomerKey => 'sAMAccountName',
    CustomerID => 'mail',
    CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
    CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
    CustomerUserSearchPrefix => '',
    CustomerUserSearchSuffix => '*',
    CustomerUserSearchListLimit => 10000,
    CustomerUserPostMasterSearchFields => ['mail'],
    CustomerUserNameFields => ['givenname', 'sn'],
    Map => [
    # note: Login, Email and CustomerID needed!
    #[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
    [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
    [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
    [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
    [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
    [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
    [ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
    #[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
    #[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
    ],
    ;









    share|improve this question


























      1












      1








      1








      I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



      I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



      After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



      What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



      The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



      My (redacted) Config.pm:



       $Self->'AuthModule' = 'Kernel::System::Auth::LDAP';


      ### OTRS Admin Auth
      ###
      $Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
      $Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
      $Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
      $Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
      $Self->'AuthModule::LDAP::AccessAttr' = 'member';
      $Self->'AuthModule::LDAP::UserAttr' = 'DN';
      $Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
      $Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
      $Self->'AuthModule::LDAP::AlwaysFilter' = '';
      $Self->'AuthModule::LDAP::Params' =
      port => 389,
      timeout => 120,
      async => 0,
      version => 3,
      sscope => 'sub'
      ;

      ### User Sync
      ### AD <==> DB OTRS (MySQL)
      $Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
      $Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
      $Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
      $Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
      $Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
      $Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
      $Self->'AuthSyncModule::LDAP::UserSyncMap' =
      # DB -> LDAP
      UserFirstname => 'givenName',
      UserLastname => 'sn',
      UserEmail => 'mail',
      ;

      $Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
      'users', 'basic_admin',
      ];
      $Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
      $Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
      $Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
      $Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
      $Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
      $Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
      $Self->CustomerUser =
      Module => 'Kernel::System::CustomerUser::LDAP',
      Params =>
      Host => '192.168.179.2', # AD Server
      BaseDN => 'dc=test,DC=local', #Domain
      SSCOPE => 'sub',
      UserDN =>'svc_otrs', #OTRS Service User
      UserPw => 'Passw0rd', #its password
      AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
      SourceCharset => 'utf-8',
      DestCharset => 'utf-8',
      ,

      CustomerKey => 'sAMAccountName',
      CustomerID => 'mail',
      CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchPrefix => '',
      CustomerUserSearchSuffix => '*',
      CustomerUserSearchListLimit => 10000,
      CustomerUserPostMasterSearchFields => ['mail'],
      CustomerUserNameFields => ['givenname', 'sn'],
      Map => [
      # note: Login, Email and CustomerID needed!
      #[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
      [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
      [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
      [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
      [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
      [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
      [ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
      #[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
      #[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
      ],
      ;









      share|improve this question
















      I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



      I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



      After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



      What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



      The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



      My (redacted) Config.pm:



       $Self->'AuthModule' = 'Kernel::System::Auth::LDAP';


      ### OTRS Admin Auth
      ###
      $Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
      $Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
      $Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
      $Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
      $Self->'AuthModule::LDAP::AccessAttr' = 'member';
      $Self->'AuthModule::LDAP::UserAttr' = 'DN';
      $Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
      $Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
      $Self->'AuthModule::LDAP::AlwaysFilter' = '';
      $Self->'AuthModule::LDAP::Params' =
      port => 389,
      timeout => 120,
      async => 0,
      version => 3,
      sscope => 'sub'
      ;

      ### User Sync
      ### AD <==> DB OTRS (MySQL)
      $Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
      $Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
      $Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
      $Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
      $Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
      $Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
      $Self->'AuthSyncModule::LDAP::UserSyncMap' =
      # DB -> LDAP
      UserFirstname => 'givenName',
      UserLastname => 'sn',
      UserEmail => 'mail',
      ;

      $Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
      'users', 'basic_admin',
      ];
      $Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
      $Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
      $Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
      $Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
      $Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
      $Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
      $Self->CustomerUser =
      Module => 'Kernel::System::CustomerUser::LDAP',
      Params =>
      Host => '192.168.179.2', # AD Server
      BaseDN => 'dc=test,DC=local', #Domain
      SSCOPE => 'sub',
      UserDN =>'svc_otrs', #OTRS Service User
      UserPw => 'Passw0rd', #its password
      AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
      SourceCharset => 'utf-8',
      DestCharset => 'utf-8',
      ,

      CustomerKey => 'sAMAccountName',
      CustomerID => 'mail',
      CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchPrefix => '',
      CustomerUserSearchSuffix => '*',
      CustomerUserSearchListLimit => 10000,
      CustomerUserPostMasterSearchFields => ['mail'],
      CustomerUserNameFields => ['givenname', 'sn'],
      Map => [
      # note: Login, Email and CustomerID needed!
      #[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
      [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
      [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
      [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
      [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
      [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
      [ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
      #[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
      #[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
      ],
      ;






      linux active-directory ldap ubuntu-18.04 otrs






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Apr 25 at 13:03







      Henrique

















      asked Apr 25 at 1:07









      HenriqueHenrique

      1065




      1065




















          0






          active

          oldest

          votes












          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964489%2fotrs-6-ad-integration-domain-admin-users-mapped-as-agents-not-as-otrs-admin%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964489%2fotrs-6-ad-integration-domain-admin-users-mapped-as-agents-not-as-otrs-admin%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020