# Any configuration directives you include here will override # RT's default configuration file, RT_Config.pm # # To include a directive here, just copy the equivalent statement # from RT_Config.pm and change the value. We've included a single # sample value below. # # This file is actually a perl module, so you can include valid # perl code, as well. # # The converse is also true, if this file isn't valid perl, you're # going to run into trouble. To check your SiteConfig file, use # this comamnd: # # perl -c /path/to/your/etc/RT_SiteConfig.pm Set($LogToSyslog , 'debug'); Set($LogToScreen , 'debug'); Set($LogToFile , 'debug'); Set($LogDir, 'var/log'); Set($LogToFileNamed , "rt.log"); #log to rt.log Set($LogStackTraces, 1); Set($WebBaseURL , "http://RT2:80"); Set($WebPath , ""); Set($rtname, "Canyon Partners"); Set($Organization , "Canyon Partners, LLC"); Set($DatabaseUser , "rt_user"); Set($DatabasePassword , "password"); Set($FriendlyFromLineFormat , "\"%s via HelpDesk\" <%s>"); Set($OwnerEmail , ''); Set($CorrespondAddress , 'correspond@rt2.canyonpartners.local'); Set($CommentAddress , 'comment@rt2.canyonpartners.local'); Set($SendmailPath , "/usr/sbin/sendmail"); Set($Timezone , 'US/Pacific'); Set($HomepageComponents, [qw(QuickCreate Quicksearch MyCalendar MyAdminQueues MySupportQueues MyReminders RefreshHomepage MyLocks SavedSearchList)]); #Set(@Plugins,(qw(Extension::QuickDelete))); Set (@Plugins,(qw(RT::FM RTx::Calendar RT::Extension::TicketLocking RTx::EmailCompletion RT::Authen::ExternalAuth))); Set($EmailCompletionUnprivileged,"everybody"); Set( $EmailCompletionSearchFields, [qw(EmailAddress RealName Name)] ); Set($ExternalAuthPriority, ['My_LDAP']); Set($ExternalInfoPriority, ['My_LDAP']); Set($ExternalServiceUsesSSLorTLS, 0); Set($AutoCreateNonExternalUsers, 0); Set($ExternalSettings, {'My_LDAP' => { ## GENERIC SECTION # The type of service (db/ldap/cookie) 'type' => 'ldap', # Should the service be used for authentication? 'auth' => 1, # Should the service be used for information? 'info' => 1, # The server hosting the service 'server' => 'ADServer.canyonpartners.local', ## SERVICE-SPECIFIC SECTION # If you can bind to your LDAP server anonymously you should # remove the user and pass config lines, otherwise specify them here: # # The username RT should use to connect to the LDAP server 'user' => 'RTUser', # The password RT should use to connect to the LDAP server 'pass' => 'RTUserpassword', # # The LDAP search base 'base' => 'dc=canyonpartners,dc=local', # # ALL FILTERS MUST BE VALID LDAP FILTERS ENCASED IN PARENTHESES! # YOU **MUST** SPECIFY A filter AND A d_filter!! # # The filter to use to match RT-Users 'filter' => '(objectClass=*)', # A catch-all example filter: '(objectClass=*)' # # The filter that will only match disabled users 'd_filter' => '(userAccountControl:1.2.840.113556.1.4.803:=2)', # A catch-none example d_filter: '(objectClass=FooBarBaz)' # # Should we try to use TLS to encrypt connections? 'tls' => 0, # What other args should I pass to Net::LDAP->new($host,@args)? 'net_ldap_args' => [ version => 3 ], # Does authentication depend on group membership? What group name? # What is the attribute for the group object that determines membership? ## RT ATTRIBUTE MATCHING SECTION # The list of RT attributes that uniquely identify a user # This example shows what you *can* specify.. I recommend reducing this # to just the Name and EmailAddress to save encountering problems later. 'attr_match_list' => [ 'Name', 'EmailAddress',], # The mapping of RT attributes on to LDAP attributes 'attr_map' => { 'Name' => 'sAMAccountName', 'EmailAddress' => 'mail', 'Organization' => 'physicalDeliveryOfficeName', 'RealName' => 'cn', 'ExternalAuthId' => 'sAMAccountName', 'Gecos' => 'sAMAccountName', 'WorkPhone' => 'telephoneNumber', 'Address1' => 'streetAddress', 'City' => 'l', 'State' => 'st', 'Zip' => 'postalCode', 'Country' => 'co' } } } ); 1;