Phpldapadmin needs testers

For Now only for NS7, and since nethserver-directory (openldap), nethserver-dc (Samba4AD), nethserver-sssd are still highly in development…probably we will have some bugs

the purpose is to manage, list, change the content of values in your ldap, first you are only with a read access, until you activate the ‘kamikaze’ mode, then you can change what you want, of course it is at your own risk :stuck_out_tongue:

who is admin with modifications permissions

  • on samba4AD (nethserver-dc)
    it is administrator and admin if you install at least the rpm in nethserver-testing
    nethserver-base.noarch 0:3.0.11-1.11.ge1b9cb1.ns7

  • on openldap (nethserver-directory)
    admin can write in ldap if you install from nethserver-testing
    nethserver-base.noarch 0:3.0.11-1.11.ge1b9cb1.ns7
    nethserver-directory.noarch 0:3.1.0-1.36.g37499c3.ns7

Of course all this rpm from testing will go to nethbase after a period of test :), DON’T DO THIS ON A REAL SERVER :slight_smile:

each valid login in the userpanel can be used to perform a login whatever AD or openldap, but of course only admins can change the settings.

first you must decide which user account you want (openldap or AD)
yum install

Now you can go to http://YourIP/phpldapadmin http over ssl should be forced, you can reach phpldapadmin only from the local network. You must use a login without its ‘

  • kamikaze mode enabled/disabled

    config setprop phpldapadmin kamikaze enabled
    signal-event nethserver-phpldapadmin-save

  • allow external access public/private

    config setprop phpldapadmin access public
    signal-event nethserver-phpldapadmin-save

  • stop httpd access to phpldapadmin enabled/disabled

    config setprop phpldapadmin status disabled
    signal-event nethserver-phpldapadmin-save


I’m really really interested in this module!

Next week I will surely give it a try!


yep it is a bit specific to developer, however it was for me a good study case, I know a bit more on LDAP

1 Like

Works great both with a local LDAP and local AD.

1 Like

You apply your own “Learning by doing” law :slight_smile:


released in my repo, the documentation is at