You're browsing documentation for an old version.

View Current

Restricting Sign In

Using Only Manually Imported Users

To allow only manually imported LDAP users who exist inside of your database to sign in to your application, you must create an authentication rule.

Let's create this rule using the below artisan command:

php artisan make:ldap-rule OnlyImportedUsers

A new rule will be created inside app/Ldap/Rules/OnlyImportedUsers.php

Inside this rule, we will simply return whether the users Eloquent model exists:

<?php

namespace App\Ldap\Rules;

use LdapRecord\Laravel\Auth\Rule;

class OnlyImportedUsers extends Rule
{
    /**
     * Check if the rule passes validation.
     *
     * @return bool
     */
    public function isValid()
    {
        return $this->model->exists;
    }
}

Remember, inside the generated Rule, the $model property is the Eloquent database instance of the user, while the $user property is the LdapRecord instance.

Once you've completed modifying the rule, add it into your config/auth.php file where your LDAP user provider has been configured:

// config/auth.php

'providers' => [
    // ...

    'ldap' => [
        'driver' => 'ldap',
        'model' => LdapRecord\Models\ActiveDirectory\User::class,
        'rules' => [
            App\Ldap\Rules\OnlyImportedUsers::class, // <-- Added here.
        ],
    ],
],

Make sure you run php artisan config:clear if you are caching your configuration files.

Now when you attempt to sign in to your application, you will only be able to sign in with a user who has already been imported into your local applications database.

Using an Organizational Unit

To use an Organizational Unit which contains your users that you want to allow sign in to your application, we will leverage LdapRecord model scopes.

In our application, we have an Organizational Unit named Accounting with the following Distinguished Name:

ou=Accounting,ou=Users,dc=local,dc=com

Let's create a new model scope using the below command:

php artisan make:ldap-scope OnlyAccountingUsers

Now inside of the generated scope, we will limit the query to only return users who are contained inside the our Accounting OU:

<?php

namespace App\Ldap\Scopes;

use LdapRecord\Models\Model;
use LdapRecord\Models\Scope;
use LdapRecord\Query\Model\Builder;

class OnlyAccountingUsers implements Scope
{
    /**
     * Apply the scope to the given query.
     *
     * @param Builder $query
     * @param Model   $model
     *
     * @return void
     */
    public function apply(Builder $query, Model $model)
    {
        $query->in('ou=Accounting,ou=Users,dc=local,dc=com');

        // You can also make this "environment aware" if needed:
        // $query->in(env('LDAP_USER_SCOPE'));
    }
}

After modifying the scope, we can now add the scope to our LDAP user model.

If you are using one of the built-in predefined models, you can add the global scope to the model inside your AuthServiceProvider::boot() method:

// app/Providers/AuthServiceProvider.php

/**
 * Register any authentication / authorization services.
 *
 * @return void
 */
public function boot()
{
    $this->registerPolicies();

    \LdapRecord\Models\ActiveDirectory\User::addGlobalScope(
        new OnlyAccountingUsers
    );
}

If you have created your own LDAP model, add the scope in the inside your models static boot method:

<?php

namespace App\Ldap;

use LdapRecord\Models\Model;
use App\Ldap\Scopes\CompanyScope;

class User extends Model
{
    /**
     * The "booting" method of the model.
     *
     * @return void
     */
    protected static function boot()
    {
        parent::boot();

        static::addGlobalScope(new OnlyAccountingUsers);
    }
}

Now when you attempt to sign in to your application, only users who are contained inside the Accounting OU will be allowed to authenticate.

Using a Group Membership

To use a group membership for authorizing signing in to your application, we will use an authentication rule.

In our example application, we want to only allow users who are members of a single group to authenticate. This group will be called Help Desk.

Let's create our new authentication rule by running the below command:

php artisan make:ldap-rule OnlyHelpDeskUsers

A new rule will be created inside app/Ldap/Rules/OnlyHelpDeskUsers.php

In the newly generated rule, we can check for group membership in various ways, as well as check for nested group membership, and even for multiple group memberships.

Let's walk through each example.

Checking for a single group

When checking for a single group, we will use the relation exists() method:

/**
 * Check if the rule passes validation.
 *
 * @return bool
 */
public function isValid()
{
    return $this->user->groups()->exists(
        'cn=Help Desk,ou=Groups,dc=local,dc=com'
    );
}

With the exists() method, we can also use an LdapRecord Model instance:

This approach is useful, so an exception will be thrown when the group cannot be located.

public function isValid()
{
    return $this->user->groups()->exists(
        Group::findOrFail('cn=Help Desk,ou=Groups,dc=local,dc=com')
    );
}

Or; A Common Name (cn):

public function isValid()
{
    return $this->user->groups()->exists('Help Desk');
}

Checking for multiple groups

To check that the user has all of a given set of groups, we will use the exists() method:

public function isValid()
{
    return $this->user->groups()->exists(
        'cn=Help Desk,ou=Groups,dc=local,dc=com',
        'cn=Site Admins,ou=Groups,dc=local,dc=com'
    );
}

We can also use Model instances:

public function isValid()
{
    return $this->user->groups()->exists([
        Group::findOrFail('cn=Help Desk,ou=Groups,dc=local,dc=com'),
        Group::findOrFail('cn=Site Admins,ou=Groups,dc=local,dc=com'),
    ]);
}

Or; Common Names (cn):

public function isValid()
{
    return $this->user->groups()->exists([
        'Help Desk', 'Site Admins'
    ]);
}

Checking for any given groups

To check that a user has any of a given set of groups, we will use the contains() method:

public function isValid()
{
    return $this->user->groups()->contains([
        'Help Desk', 'Accounting'
    ]);
}

You can also provide a Model instance or Distinguished Name into the contains method.

This will allow members of either the Help Desk or Accounting group to authenticate.

Checking for nested group(s) recursively

Nested group checking allows LdapRecord to search recursively if a user is a member of a particular group.

For example, if a user is a member of an Accounting group, and this Accounting group is a member of an Office group, you can tell LdapRecord to search recursively for the Office group:

public function isValid()
{
    return $this->user->groups()->recursive()->exists('Office');
}

Using the above example without the recursive call, it will fail to determine the users group membership, since LdapRecord is only searching for immediate memberships of the user:

public function isValid()
{
    // Only searching immediate group memberships:
    return $this->user->groups()->exists('Office');
}
Generated on March 17, 2024
Edit on GitHub