OTRS 6 - AD integration - Domain Admin users mapped as Agents, not as OTRS AdminsHow can I make domain admins...

Do I have an "anti-research" personality?

Is Diceware more secure than a long passphrase?

How did Captain America manage to do this?

555 timer FM transmitter

Is there really no use for MD5 anymore?

How to denote matrix elements succinctly?

How could Tony Stark make this in Endgame?

Is it idiomatic to construct against `this`

a sore throat vs a strep throat vs strep throat

Dynamic SOQL query relationship with field visibility for Users

How to fry ground beef so it is well-browned

What makes accurate emulation of old systems a difficult task?

Does tea made with boiling water cool faster than tea made with boiled (but still hot) water?

Extension of 2-adic valuation to the real numbers

How can I practically buy stocks?

Was there a shared-world project before "Thieves World"?

Can we say “you can pay when the order gets ready”?

Can an Area of Effect spell cast outside a Prismatic Wall extend inside it?

As an international instructor, should I openly talk about my accent?

How does Captain America channel this power?

How to write a column outside the braces in a matrix?

Was there a Viking Exchange as well as a Columbian one?

Relationship between strut and baselineskip

Multiple options vs single option UI



OTRS 6 - AD integration - Domain Admin users mapped as Agents, not as OTRS Admins


How can I make domain admins become admins on the computers connected to the domain?Domain Admin permissions/rightsPermissions assigned to Domain Users do not propagateLock all domain shared folder to an admin domain userHow to list the users and groups of an AD Security Group when not a domain adminAdmin group membership not replicatedLoad thumbnail photos of Active Directory users as a domain user (not controller) to OutlookTemporary Password for Domain AdminWinbind not enumerating users and groups of trusted domainMigrating Domain Users to another Domain






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







0















I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



I installed it "by the book" using the official docs and it worked like a charm! It has been nstalled on Ubuntu Server 18.04 LTS. I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



My (redacted) Config.pm:



     $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';


### OTRS Admin Auth
###
$Self->{'AuthModule::LDAP::Host'} = '192.168.179.2'; # AD Server
$Self->{'AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
$Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
$Self->{'AuthModule::LDAP::GroupDN'} = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
$Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
$Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
$Self->{'AuthModule::LDAP::SearchUserDN'} = 'svc_otrs'; #OTRS service user
$Self->{'AuthModule::LDAP::SearchUserPw'} = 'Passw0rd'; #And its passwird
$Self->{'AuthModule::LDAP::AlwaysFilter'} = '';
$Self->{'AuthModule::LDAP::Params'} = {
port => 389,
timeout => 120,
async => 0,
version => 3,
sscope => 'sub'
};

### User Sync
### AD <==> DB OTRS (MySQL)
$Self->{'AuthSyncModule'} = 'Kernel::System::Auth::Sync::LDAP';
$Self->{'AuthSyncModule::LDAP::Host'} = '192.168.179.2'; # AD SRV
$Self->{'AuthSyncModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
$Self->{'AuthSyncModule::LDAP::UID'} = 'sAMAccountName';
$Self->{'AuthSyncModule::LDAP::SearchUserDN'} = 'svc_otrs';
$Self->{'AuthSyncModule::LDAP::SearchUserPw'} = 'Passw0rd';
$Self->{'AuthSyncModule::LDAP::UserSyncMap'} = {
# DB -> LDAP
UserFirstname => 'givenName',
UserLastname => 'sn',
UserEmail => 'mail',
};

$Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups'} = [
'users', 'basic_admin',
];
$Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
$Self->{'Customer::AuthModule::LDAP::Host'} = '192.168.179.2';
$Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local';
$Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
$Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'svc_otrs';
$Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'Passw0rd';
$Self->{CustomerUser} = {
Module => 'Kernel::System::CustomerUser::LDAP',
Params => {
Host => '192.168.179.2', # AD Server
BaseDN => 'dc=test,DC=local', #Domain
SSCOPE => 'sub',
UserDN =>'svc_otrs', #OTRS Service User
UserPw => 'Passw0rd', #its password
AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
SourceCharset => 'utf-8',
DestCharset => 'utf-8',
},

CustomerKey => 'sAMAccountName',
CustomerID => 'mail',
CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
CustomerUserSearchPrefix => '',
CustomerUserSearchSuffix => '*',
CustomerUserSearchListLimit => 10000,
CustomerUserPostMasterSearchFields => ['mail'],
CustomerUserNameFields => ['givenname', 'sn'],
Map => [
# note: Login, Email and CustomerID needed!
#[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
[ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
[ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
[ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
[ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
[ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
[ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
#[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
#[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
],
};









share|improve this question







New contributor




Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.



























    0















    I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



    I installed it "by the book" using the official docs and it worked like a charm! It has been nstalled on Ubuntu Server 18.04 LTS. I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



    After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



    What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



    The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



    My (redacted) Config.pm:



         $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';


    ### OTRS Admin Auth
    ###
    $Self->{'AuthModule::LDAP::Host'} = '192.168.179.2'; # AD Server
    $Self->{'AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
    $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
    $Self->{'AuthModule::LDAP::GroupDN'} = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
    $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
    $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
    $Self->{'AuthModule::LDAP::SearchUserDN'} = 'svc_otrs'; #OTRS service user
    $Self->{'AuthModule::LDAP::SearchUserPw'} = 'Passw0rd'; #And its passwird
    $Self->{'AuthModule::LDAP::AlwaysFilter'} = '';
    $Self->{'AuthModule::LDAP::Params'} = {
    port => 389,
    timeout => 120,
    async => 0,
    version => 3,
    sscope => 'sub'
    };

    ### User Sync
    ### AD <==> DB OTRS (MySQL)
    $Self->{'AuthSyncModule'} = 'Kernel::System::Auth::Sync::LDAP';
    $Self->{'AuthSyncModule::LDAP::Host'} = '192.168.179.2'; # AD SRV
    $Self->{'AuthSyncModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
    $Self->{'AuthSyncModule::LDAP::UID'} = 'sAMAccountName';
    $Self->{'AuthSyncModule::LDAP::SearchUserDN'} = 'svc_otrs';
    $Self->{'AuthSyncModule::LDAP::SearchUserPw'} = 'Passw0rd';
    $Self->{'AuthSyncModule::LDAP::UserSyncMap'} = {
    # DB -> LDAP
    UserFirstname => 'givenName',
    UserLastname => 'sn',
    UserEmail => 'mail',
    };

    $Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups'} = [
    'users', 'basic_admin',
    ];
    $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
    $Self->{'Customer::AuthModule::LDAP::Host'} = '192.168.179.2';
    $Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local';
    $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
    $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'svc_otrs';
    $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'Passw0rd';
    $Self->{CustomerUser} = {
    Module => 'Kernel::System::CustomerUser::LDAP',
    Params => {
    Host => '192.168.179.2', # AD Server
    BaseDN => 'dc=test,DC=local', #Domain
    SSCOPE => 'sub',
    UserDN =>'svc_otrs', #OTRS Service User
    UserPw => 'Passw0rd', #its password
    AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
    SourceCharset => 'utf-8',
    DestCharset => 'utf-8',
    },

    CustomerKey => 'sAMAccountName',
    CustomerID => 'mail',
    CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
    CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
    CustomerUserSearchPrefix => '',
    CustomerUserSearchSuffix => '*',
    CustomerUserSearchListLimit => 10000,
    CustomerUserPostMasterSearchFields => ['mail'],
    CustomerUserNameFields => ['givenname', 'sn'],
    Map => [
    # note: Login, Email and CustomerID needed!
    #[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
    [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
    [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
    [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
    [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
    [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
    [ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
    #[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
    #[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
    ],
    };









    share|improve this question







    New contributor




    Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.























      0












      0








      0








      I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



      I installed it "by the book" using the official docs and it worked like a charm! It has been nstalled on Ubuntu Server 18.04 LTS. I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



      After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



      What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



      The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



      My (redacted) Config.pm:



           $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';


      ### OTRS Admin Auth
      ###
      $Self->{'AuthModule::LDAP::Host'} = '192.168.179.2'; # AD Server
      $Self->{'AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
      $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
      $Self->{'AuthModule::LDAP::GroupDN'} = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
      $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
      $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
      $Self->{'AuthModule::LDAP::SearchUserDN'} = 'svc_otrs'; #OTRS service user
      $Self->{'AuthModule::LDAP::SearchUserPw'} = 'Passw0rd'; #And its passwird
      $Self->{'AuthModule::LDAP::AlwaysFilter'} = '';
      $Self->{'AuthModule::LDAP::Params'} = {
      port => 389,
      timeout => 120,
      async => 0,
      version => 3,
      sscope => 'sub'
      };

      ### User Sync
      ### AD <==> DB OTRS (MySQL)
      $Self->{'AuthSyncModule'} = 'Kernel::System::Auth::Sync::LDAP';
      $Self->{'AuthSyncModule::LDAP::Host'} = '192.168.179.2'; # AD SRV
      $Self->{'AuthSyncModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
      $Self->{'AuthSyncModule::LDAP::UID'} = 'sAMAccountName';
      $Self->{'AuthSyncModule::LDAP::SearchUserDN'} = 'svc_otrs';
      $Self->{'AuthSyncModule::LDAP::SearchUserPw'} = 'Passw0rd';
      $Self->{'AuthSyncModule::LDAP::UserSyncMap'} = {
      # DB -> LDAP
      UserFirstname => 'givenName',
      UserLastname => 'sn',
      UserEmail => 'mail',
      };

      $Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups'} = [
      'users', 'basic_admin',
      ];
      $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
      $Self->{'Customer::AuthModule::LDAP::Host'} = '192.168.179.2';
      $Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local';
      $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
      $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'svc_otrs';
      $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'Passw0rd';
      $Self->{CustomerUser} = {
      Module => 'Kernel::System::CustomerUser::LDAP',
      Params => {
      Host => '192.168.179.2', # AD Server
      BaseDN => 'dc=test,DC=local', #Domain
      SSCOPE => 'sub',
      UserDN =>'svc_otrs', #OTRS Service User
      UserPw => 'Passw0rd', #its password
      AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
      SourceCharset => 'utf-8',
      DestCharset => 'utf-8',
      },

      CustomerKey => 'sAMAccountName',
      CustomerID => 'mail',
      CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchPrefix => '',
      CustomerUserSearchSuffix => '*',
      CustomerUserSearchListLimit => 10000,
      CustomerUserPostMasterSearchFields => ['mail'],
      CustomerUserNameFields => ['givenname', 'sn'],
      Map => [
      # note: Login, Email and CustomerID needed!
      #[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
      [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
      [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
      [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
      [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
      [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
      [ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
      #[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
      #[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
      ],
      };









      share|improve this question







      New contributor




      Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.












      I am testing OTRS 6 with the ITSM module. Right now I'm only testing it on our DEV environment, so it would not be a problem to ditch everything and start from scratch if it's the easiest way. I intend to put it to production soon, tho.



      I installed it "by the book" using the official docs and it worked like a charm! It has been nstalled on Ubuntu Server 18.04 LTS. I have all users authenticating locally using the User Database on MySQL. I had Customers, Agents and Admins all able to authenticate and being presented with the correct user panel.



      After that, I have been able to successfully integrate OTRS with my AD, but with a catch: all my AD users are mapped as Customers, all my Domain Admins (who also belong to the OTRS_Admins AD Group) are Agents, and.... I'm left with no account to manage OTRS. No Admins at all.



      What should I do? How can I map my Domain Admins to be OTRS Admins and not Agents? How to map some of my Domain Users to be Agents? Am I doing something wrong? I'm completely lost.



      The oficial docs don´t help that much, and I couldn't find on Google anyone with my specific need.



      My (redacted) Config.pm:



           $Self->{'AuthModule'} = 'Kernel::System::Auth::LDAP';


      ### OTRS Admin Auth
      ###
      $Self->{'AuthModule::LDAP::Host'} = '192.168.179.2'; # AD Server
      $Self->{'AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
      $Self->{'AuthModule::LDAP::UID'} = 'sAMAccountName';
      $Self->{'AuthModule::LDAP::GroupDN'} = 'CN=OTRS_Admins,CN=Users,DC=test,DC=local'; #OTRS Admin group
      $Self->{'AuthModule::LDAP::AccessAttr'} = 'member';
      $Self->{'AuthModule::LDAP::UserAttr'} = 'DN';
      $Self->{'AuthModule::LDAP::SearchUserDN'} = 'svc_otrs'; #OTRS service user
      $Self->{'AuthModule::LDAP::SearchUserPw'} = 'Passw0rd'; #And its passwird
      $Self->{'AuthModule::LDAP::AlwaysFilter'} = '';
      $Self->{'AuthModule::LDAP::Params'} = {
      port => 389,
      timeout => 120,
      async => 0,
      version => 3,
      sscope => 'sub'
      };

      ### User Sync
      ### AD <==> DB OTRS (MySQL)
      $Self->{'AuthSyncModule'} = 'Kernel::System::Auth::Sync::LDAP';
      $Self->{'AuthSyncModule::LDAP::Host'} = '192.168.179.2'; # AD SRV
      $Self->{'AuthSyncModule::LDAP::BaseDN'} = 'dc=test,DC=local'; # Domain
      $Self->{'AuthSyncModule::LDAP::UID'} = 'sAMAccountName';
      $Self->{'AuthSyncModule::LDAP::SearchUserDN'} = 'svc_otrs';
      $Self->{'AuthSyncModule::LDAP::SearchUserPw'} = 'Passw0rd';
      $Self->{'AuthSyncModule::LDAP::UserSyncMap'} = {
      # DB -> LDAP
      UserFirstname => 'givenName',
      UserLastname => 'sn',
      UserEmail => 'mail',
      };

      $Self->{'AuthSyncModule::LDAP::UserSyncInitialGroups'} = [
      'users', 'basic_admin',
      ];
      $Self->{'Customer::AuthModule'} = 'Kernel::System::CustomerAuth::LDAP';
      $Self->{'Customer::AuthModule::LDAP::Host'} = '192.168.179.2';
      $Self->{'Customer::AuthModule::LDAP::BaseDN'} = 'dc=test,DC=local';
      $Self->{'Customer::AuthModule::LDAP::UID'} = 'sAMAccountName';
      $Self->{'Customer::AuthModule::LDAP::SearchUserDN'} = 'svc_otrs';
      $Self->{'Customer::AuthModule::LDAP::SearchUserPw'} = 'Passw0rd';
      $Self->{CustomerUser} = {
      Module => 'Kernel::System::CustomerUser::LDAP',
      Params => {
      Host => '192.168.179.2', # AD Server
      BaseDN => 'dc=test,DC=local', #Domain
      SSCOPE => 'sub',
      UserDN =>'svc_otrs', #OTRS Service User
      UserPw => 'Passw0rd', #its password
      AlwaysFilter => '(&(samAccountType=805306368)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))',
      SourceCharset => 'utf-8',
      DestCharset => 'utf-8',
      },

      CustomerKey => 'sAMAccountName',
      CustomerID => 'mail',
      CustomerUserListFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchFields => ['sAMAccountName', 'cn', 'mail'],
      CustomerUserSearchPrefix => '',
      CustomerUserSearchSuffix => '*',
      CustomerUserSearchListLimit => 10000,
      CustomerUserPostMasterSearchFields => ['mail'],
      CustomerUserNameFields => ['givenname', 'sn'],
      Map => [
      # note: Login, Email and CustomerID needed!
      #[ 'UserSalutation', 'Title', 'title', 1, 0, 'var' ],
      [ 'UserFirstname', 'Firstname', 'givenname', 1, 1, 'var' ],
      [ 'UserLastname', 'Lastname', 'sn', 1, 1, 'var' ],
      [ 'UserLogin', 'Login', 'sAMAccountName', 1, 1, 'var' ],
      [ 'UserEmail', 'Email', 'mail', 1, 1, 'var' ],
      [ 'UserCustomerID', 'CustomerID', 'mail', 0, 1, 'var' ],
      [ 'UserPhone', 'Phone', 'telephonenumber', 1, 0, 'var' ],
      #[ 'UserAddress', 'Address', 'postaladdress', 1, 0, 'var' ],
      #[ 'UserComment', 'Comment', 'description', 1, 0, 'var' ],
      ],
      };






      active-directory






      share|improve this question







      New contributor




      Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked yesterday









      HenriqueHenrique

      1011




      1011




      New contributor




      Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Henrique is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          0






          active

          oldest

          votes












          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "3"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });






          Henrique is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1429567%2fotrs-6-ad-integration-domain-admin-users-mapped-as-agents-not-as-otrs-admin%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes








          Henrique is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          Henrique is a new contributor. Be nice, and check out our Code of Conduct.













          Henrique is a new contributor. Be nice, and check out our Code of Conduct.












          Henrique is a new contributor. Be nice, and check out our Code of Conduct.
















          Thanks for contributing an answer to Super User!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1429567%2fotrs-6-ad-integration-domain-admin-users-mapped-as-agents-not-as-otrs-admin%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Couldn't open a raw socket. Error: Permission denied (13) (nmap)Is it possible to run networking commands...

          VNC viewer RFB protocol error: bad desktop size 0x0I Cannot Type the Key 'd' (lowercase) in VNC Viewer...

          Why not use the yoke to control yaw, as well as pitch and roll? Announcing the arrival of...