OTRS 6 - AD integration - Domain Admin users mapped as Agents, not as OTRS AdminsLDAP based virtual domain set-up for DovecotMake Postfix local(8) tempfail on LDAP outagepasswd for ldap usersConnecting a linux client into active directoryNeed help understanding PAM directivesHow to use PAM to check LDAP password for some users, yet always use UID/GIDs from local files?Auth fail on Samba server with LDAP backendOTRS authenticating with LDAP, how to get ALL UsersOpenLDAP: Index to olcDatabase not respectedGitlab ladp integration authentication Error
How to increase the size of the cursor in Lubuntu 19.04?
What exactly are the `size issues' preventing formation of presheaves being a left adjoint to some forgetful functor?
29er Road Tire?
Something that can be activated/enabled
Why wasn't the Night King naked in S08E03?
How do LIGO and VIRGO know that a gravitational wave has its origin in a neutron star or a black hole?
My advisor talks about me to his colleague
In Stroustrup's example, what does this colon mean in `return 1 : 2`? It's not a label or ternary operator
Should I dumb down my writing in a foreign country?
What is a smasher?
What does "Managed by Windows" do in the Power options for network connection?
Did the manned NASA capsules rotate during descent?
List of newcommands used
Upside-Down Pyramid Addition...REVERSED!
When two pilots are required for a private aircraft, is it a requirement for the PIC to be ATPL?
exec command in bash loop
Has a commercial or military jet bi-plane ever been manufactured?
What to use instead of cling film to wrap pastry
Did we get closer to another plane than we were supposed to, or was the pilot just protecting our delicate sensibilities?
Identifying characters
How I can I roll a number of non-digital dice to get a random number between 1 and 150?
How can I roleplay a follower-type character when I as a player have a leader-type personality?
Find the cheapest shipping option based on item weight
Do I add my skill check modifier to the roll of 15 granted by Glibness?
OTRS 6 - AD integration - Domain Admin users mapped as Agents, not as OTRS Admins
LDAP based virtual domain set-up for DovecotMake Postfix local(8) tempfail on LDAP outagepasswd for ldap usersConnecting a linux client into active directoryNeed help understanding PAM directivesHow to use PAM to check LDAP password for some users, yet always use UID/GIDs from local files?Auth fail on Samba server with LDAP backendOTRS authenticating with LDAP, how to get ALL UsersOpenLDAP: Index to olcDatabase not respectedGitlab ladp integration authentication Error
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;
I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.
I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.
After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.
What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.
The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.
My (redacted) Config.pm:
$Self->'AuthModule' = 'Kernel::System::Auth::LDAP';
### OTRS Admin Auth
###
$Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
$Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
$Self->'AuthModule::LDAP::AccessAttr' = 'member';
$Self->'AuthModule::LDAP::UserAttr' = 'DN';
$Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
$Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
$Self->'AuthModule::LDAP::AlwaysFilter' = '';
$Self->'AuthModule::LDAP::Params' =
port => 389,
timeout => 120,
async => 0,
version => 3,
sscope => 'sub'
;
### User Sync
### AD <==> DB OTRS (MySQL)
$Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
$Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
$Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->'AuthSyncModule::LDAP::UserSyncMap' =
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
;
$Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
'users', 'basic_admin',
];
$Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
$Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
$Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
$Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->CustomerUser =
Module => 'Kernel::System::CustomerUser::LDAP',
Params =>
Host => '192.168.179.2', # AD Server
BaseDN => 'dc=test,DC=local', #Domain
SSCOPE => 'sub',
UserDN =>'svc_otrs', #OTRS Service User
UserPw => 'Passw0rd', #its password
AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
SourceCharset => 'utf-8',
DestCharset => 'utf-8',
,
CustomerKey => 'sAMAccountName',
CustomerID => 'mail',
CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchPrefix => '',
CustomerUserSearchSuffix => '*',
CustomerUserSearchListLimit => 10000,
CustomerUserPostMasterSearchFields => ['mail'],
CustomerUserNameFields => ['givenname', 'sn'],
Map => [
# note: Login, Email and CustomerID needed!
#[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
[ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
[ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
[ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
[ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
[ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
[ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
#[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
#[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
],
;
linux active-directory ldap ubuntu-18.04 otrs
add a comment |
I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.
I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.
After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.
What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.
The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.
My (redacted) Config.pm:
$Self->'AuthModule' = 'Kernel::System::Auth::LDAP';
### OTRS Admin Auth
###
$Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
$Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
$Self->'AuthModule::LDAP::AccessAttr' = 'member';
$Self->'AuthModule::LDAP::UserAttr' = 'DN';
$Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
$Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
$Self->'AuthModule::LDAP::AlwaysFilter' = '';
$Self->'AuthModule::LDAP::Params' =
port => 389,
timeout => 120,
async => 0,
version => 3,
sscope => 'sub'
;
### User Sync
### AD <==> DB OTRS (MySQL)
$Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
$Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
$Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->'AuthSyncModule::LDAP::UserSyncMap' =
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
;
$Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
'users', 'basic_admin',
];
$Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
$Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
$Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
$Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->CustomerUser =
Module => 'Kernel::System::CustomerUser::LDAP',
Params =>
Host => '192.168.179.2', # AD Server
BaseDN => 'dc=test,DC=local', #Domain
SSCOPE => 'sub',
UserDN =>'svc_otrs', #OTRS Service User
UserPw => 'Passw0rd', #its password
AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
SourceCharset => 'utf-8',
DestCharset => 'utf-8',
,
CustomerKey => 'sAMAccountName',
CustomerID => 'mail',
CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchPrefix => '',
CustomerUserSearchSuffix => '*',
CustomerUserSearchListLimit => 10000,
CustomerUserPostMasterSearchFields => ['mail'],
CustomerUserNameFields => ['givenname', 'sn'],
Map => [
# note: Login, Email and CustomerID needed!
#[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
[ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
[ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
[ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
[ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
[ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
[ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
#[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
#[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
],
;
linux active-directory ldap ubuntu-18.04 otrs
add a comment |
I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.
I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.
After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.
What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.
The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.
My (redacted) Config.pm:
$Self->'AuthModule' = 'Kernel::System::Auth::LDAP';
### OTRS Admin Auth
###
$Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
$Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
$Self->'AuthModule::LDAP::AccessAttr' = 'member';
$Self->'AuthModule::LDAP::UserAttr' = 'DN';
$Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
$Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
$Self->'AuthModule::LDAP::AlwaysFilter' = '';
$Self->'AuthModule::LDAP::Params' =
port => 389,
timeout => 120,
async => 0,
version => 3,
sscope => 'sub'
;
### User Sync
### AD <==> DB OTRS (MySQL)
$Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
$Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
$Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->'AuthSyncModule::LDAP::UserSyncMap' =
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
;
$Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
'users', 'basic_admin',
];
$Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
$Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
$Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
$Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->CustomerUser =
Module => 'Kernel::System::CustomerUser::LDAP',
Params =>
Host => '192.168.179.2', # AD Server
BaseDN => 'dc=test,DC=local', #Domain
SSCOPE => 'sub',
UserDN =>'svc_otrs', #OTRS Service User
UserPw => 'Passw0rd', #its password
AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
SourceCharset => 'utf-8',
DestCharset => 'utf-8',
,
CustomerKey => 'sAMAccountName',
CustomerID => 'mail',
CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchPrefix => '',
CustomerUserSearchSuffix => '*',
CustomerUserSearchListLimit => 10000,
CustomerUserPostMasterSearchFields => ['mail'],
CustomerUserNameFields => ['givenname', 'sn'],
Map => [
# note: Login, Email and CustomerID needed!
#[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
[ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
[ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
[ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
[ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
[ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
[ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
#[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
#[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
],
;
linux active-directory ldap ubuntu-18.04 otrs
I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.
I installed it "by the book" using the official docs and it worked like a charm! (EDIT: Installed on Ubuntu Server 18.04 LTS) I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.
After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.
What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.
The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.
My (redacted) Config.pm:
$Self->'AuthModule' = 'Kernel::System::Auth::LDAP';
### OTRS Admin Auth
###
$Self->'AuthModule::LDAP::Host' = '192.168.179.2'; # AD Server
$Self->'AuthModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthModule::LDAP::GroupDN' = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
$Self->'AuthModule::LDAP::AccessAttr' = 'member';
$Self->'AuthModule::LDAP::UserAttr' = 'DN';
$Self->'AuthModule::LDAP::SearchUserDN' = 'svc_otrs'; #OTRS service user
$Self->'AuthModule::LDAP::SearchUserPw' = 'Passw0rd'; #And its passwird
$Self->'AuthModule::LDAP::AlwaysFilter' = '';
$Self->'AuthModule::LDAP::Params' =
port => 389,
timeout => 120,
async => 0,
version => 3,
sscope => 'sub'
;
### User Sync
### AD <==> DB OTRS (MySQL)
$Self->'AuthSyncModule' = 'Kernel::System::Auth::Sync::LDAP';
$Self->'AuthSyncModule::LDAP::Host' = '192.168.179.2'; # AD SRV
$Self->'AuthSyncModule::LDAP::BaseDN' = 'dc=test,DC=local'; # Domain
$Self->'AuthSyncModule::LDAP::UID' = 'sAMAccountName';
$Self->'AuthSyncModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'AuthSyncModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->'AuthSyncModule::LDAP::UserSyncMap' =
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
;
$Self->'AuthSyncModule::LDAP::UserSyncInitialGroups' = [
'users', 'basic_admin',
];
$Self->'Customer::AuthModule' = 'Kernel::System::CustomerAuth::LDAP';
$Self->'Customer::AuthModule::LDAP::Host' = '192.168.179.2';
$Self->'Customer::AuthModule::LDAP::BaseDN' = 'dc=test,DC=local';
$Self->'Customer::AuthModule::LDAP::UID' = 'sAMAccountName';
$Self->'Customer::AuthModule::LDAP::SearchUserDN' = 'svc_otrs';
$Self->'Customer::AuthModule::LDAP::SearchUserPw' = 'Passw0rd';
$Self->CustomerUser =
Module => 'Kernel::System::CustomerUser::LDAP',
Params =>
Host => '192.168.179.2', # AD Server
BaseDN => 'dc=test,DC=local', #Domain
SSCOPE => 'sub',
UserDN =>'svc_otrs', #OTRS Service User
UserPw => 'Passw0rd', #its password
AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
SourceCharset => 'utf-8',
DestCharset => 'utf-8',
,
CustomerKey => 'sAMAccountName',
CustomerID => 'mail',
CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchPrefix => '',
CustomerUserSearchSuffix => '*',
CustomerUserSearchListLimit => 10000,
CustomerUserPostMasterSearchFields => ['mail'],
CustomerUserNameFields => ['givenname', 'sn'],
Map => [
# note: Login, Email and CustomerID needed!
#[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
[ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
[ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
[ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
[ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
[ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
[ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
#[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
#[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
],
;
linux active-directory ldap ubuntu-18.04 otrs
linux active-directory ldap ubuntu-18.04 otrs
edited Apr 25 at 13:03
Henrique
asked Apr 25 at 1:07
HenriqueHenrique
1065
1065
add a comment |
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964489%2fotrs-6-ad-integration-domain-admin-users-mapped-as-agents-not-as-otrs-admin%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Server Fault!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964489%2fotrs-6-ad-integration-domain-admin-users-mapped-as-agents-not-as-otrs-admin%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown