Thread:Extension talk:LDAP Authentication/Unable to get plugin to work with OpenLDAP + Fix/reply (2)

I am currently using the latest git version of the plugin, and mediawiki 1.21.1

Config below: # Prevent new user registrations except by sysops $wgGroupPermissions['*']['createaccount'] = false; # Disable anonymous editing $wgGroupPermissions['*']['edit'] = false; require_once( "$IP/extensions/LdapAuthentication/LdapAuthentication.php" ); $wgAuth = new LdapAuthenticationPlugin; // The names of one or more domains you wish to use // These names will be used for the other options, it is freely choosable and not dependent // on your system. These names will show in the Login-Screen, so it is important that the user // understands the meaning. //   // REQUIRED //   // Default: none $wgLDAPDomainNames = array(     'SandyDNET'    ); // The fully qualified name of one or more servers per domain you wish to use. If you are // going to use SSL or StartTLS, it is important that the server names provided here exactly // match the name provided by the SSL certificate returned by the server; otherwise, you may // have problems. // REQUIRED // Default: none $wgLDAPServerNames = array(     'SandyDNET' => 'removedip'    ); // The type of encryption you would like to use when connecting to the LDAP server. // Available options are 'tls', 'ssl', and 'clear' // Default: tls $wgLDAPGroupUseFullDN = array( "SandyDNET"=>true ); $wgLDAPEncryptionType = array('SandyDNET' => 'tls'); $wgLDAPProxyAgent = array('SandyDNET' => 'removedbind'); $wgLDAPProxyAgentPassword = array('SandyDNET' => 'removedpassword'); // Search filter. // These options are only needed if you want to search for users to bind with them. In otherwords, // if you cannot do direct binds based upon $wgLDAPSearchStrings, then you'll need these two options. // If you need a proxyagent to search, remember to set $wgLDAPProxyAgent, and $wgLDAPProxyAgentPassword. // Anonymous searching is supported. To do an anonymous search, use SearchAttibutes and don't set a Proxy // agent for the domain required. $wgLDAPSearchAttributes = array(     'SandyDNET' => 'uid'    ); $wgLDAPDebug = 3; $wgDebugLogGroups['ldap'] = '/tmp/debug.log'; // Base DNs. Group and User base DNs will be used if available; if they are not defined, the search // will default to $wgLDAPBaseDNs $wgLDAPBaseDNs = array(     'SandyDNET' => 'dc=sandydpnet,dc=me'    ); $wgLDAPUseLocal = false; $wgMinimalPasswordLength = 1; $wgLDAPGroupBaseDNs = array('SandyDNET' => 'dc=sandydpnet,dc=me'); $wgLDAPUserBaseDNs = array('SandyDNET' => 'dc=sandydpnet,dc=me'); $wgLDAPUserObjectclass = array( "SandyDNET"=>"person" ); $wgLDAPUseLDAPGroups = array( "SandyDNET"=>true ); $wgLDAPGroupNameAttribute = array( "SandyDNET"=>"cn" ); $wgLDAPGroupObjectclass = array( "SandyDNET"=>"posixGroup" ); $wgLDAPGroupAttribute = array("SandyDNET"=>'MemberUid'); $wgLDAPPreferences = array( 'SandyDNET' => array( 'email' => 'homePostalAddress')); $wgLDAPGroupSearchNestedGroups = array( "SandyDNET"=>true ); $wgLDAPRequiredGroups = array( "SandyDNET"=>array("cn=admin_staff,ou=groups,dc=sandydpnet,dc=me") );