3 // This file is part of Moodle - http://moodle.org/
5 // Moodle is free software: you can redistribute it and/or modify
6 // it under the terms of the GNU General Public License as published by
7 // the Free Software Foundation, either version 3 of the License, or
8 // (at your option) any later version.
10 // Moodle is distributed in the hope that it will be useful,
11 // but WITHOUT ANY WARRANTY; without even the implied warranty of
12 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 // GNU General Public License for more details.
15 // You should have received a copy of the GNU General Public License
16 // along with Moodle. If not, see <http://www.gnu.org/licenses/>.
19 * Multiple plugin authentication Support library
21 * 2006-08-28 File created, AUTH return values defined.
25 * @copyright 1999 onwards Martin Dougiamas http://dougiamas.com
26 * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
29 defined('MOODLE_INTERNAL') ||
die();
32 * Returned when the login was successful.
37 * Returned when the login was unsuccessful.
39 define('AUTH_FAIL', 1);
42 * Returned when the login was denied (a reason for AUTH_FAIL).
44 define('AUTH_DENIED', 2);
47 * Returned when some error occurred (a reason for AUTH_FAIL).
49 define('AUTH_ERROR', 4);
52 * Authentication - error codes for user confirm
54 define('AUTH_CONFIRM_FAIL', 0);
55 define('AUTH_CONFIRM_OK', 1);
56 define('AUTH_CONFIRM_ALREADY', 2);
57 define('AUTH_CONFIRM_ERROR', 3);
60 define('AUTH_REMOVEUSER_KEEP', 0);
61 define('AUTH_REMOVEUSER_SUSPEND', 1);
62 define('AUTH_REMOVEUSER_FULLDELETE', 2);
64 /** Login attempt successful. */
65 define('AUTH_LOGIN_OK', 0);
67 /** Can not login because user does not exist. */
68 define('AUTH_LOGIN_NOUSER', 1);
70 /** Can not login because user is suspended. */
71 define('AUTH_LOGIN_SUSPENDED', 2);
73 /** Can not login, most probably password did not match. */
74 define('AUTH_LOGIN_FAILED', 3);
76 /** Can not login because user is locked out. */
77 define('AUTH_LOGIN_LOCKOUT', 4);
79 /** Can not login becauser user is not authorised. */
80 define('AUTH_LOGIN_UNAUTHORISED', 5);
83 * Abstract authentication plugin.
85 * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
88 class auth_plugin_base
{
91 * The configuration details for the plugin.
97 * Authentication plugin type - the same as db field.
102 * The fields we can lock and update from/to external authentication backends
105 var $userfields = array(
127 * Moodle custom fields to sync with.
130 var $customfields = null;
133 * This is the primary method that is used by the authenticate_user_login()
134 * function in moodlelib.php.
136 * This method should return a boolean indicating
137 * whether or not the username and password authenticate successfully.
139 * Returns true if the username and password work and false if they are
140 * wrong or don't exist.
142 * @param string $username The username (with system magic quotes)
143 * @param string $password The password (with system magic quotes)
145 * @return bool Authentication success or failure.
147 function user_login($username, $password) {
148 print_error('mustbeoveride', 'debug', '', 'user_login()' );
152 * Returns true if this authentication plugin can change the users'
157 function can_change_password() {
163 * Returns the URL for changing the users' passwords, or empty if the default
166 * This method is used if can_change_password() returns true.
167 * This method is called only when user is logged in, it may use global $USER.
168 * If you are using a plugin config variable in this method, please make sure it is set before using it,
169 * as this method can be called even if the plugin is disabled, in which case the config values won't be set.
171 * @return moodle_url url of the profile page or null if standard used
173 function change_password_url() {
179 * Returns true if this authentication plugin can edit the users'
184 function can_edit_profile() {
190 * Returns the URL for editing the users' profile, or empty if the default
193 * This method is used if can_edit_profile() returns true.
194 * This method is called only when user is logged in, it may use global $USER.
196 * @return moodle_url url of the profile page or null if standard used
198 function edit_profile_url() {
204 * Returns true if this authentication plugin is "internal".
206 * Internal plugins use password hashes from Moodle user table for authentication.
210 function is_internal() {
216 * Returns false if this plugin is enabled but not configured.
220 public function is_configured() {
225 * Indicates if password hashes should be stored in local moodle database.
226 * @return bool true means md5 password hash stored in user table, false means flag 'not_cached' stored there instead
228 function prevent_local_passwords() {
229 return !$this->is_internal();
233 * Indicates if moodle should automatically update internal user
234 * records with data from external sources using the information
235 * from get_userinfo() method.
237 * @return bool true means automatically copy data from ext to user table
239 function is_synchronised_with_external() {
240 return !$this->is_internal();
244 * Updates the user's password.
246 * In previous versions of Moodle, the function
247 * auth_user_update_password accepted a username as the first parameter. The
248 * revised function expects a user object.
250 * @param object $user User table object
251 * @param string $newpassword Plaintext password
253 * @return bool True on success
255 function user_update_password($user, $newpassword) {
261 * Called when the user record is updated.
262 * Modifies user in external database. It takes olduser (before changes) and newuser (after changes)
263 * compares information saved modified information to external db.
265 * @param mixed $olduser Userobject before modifications (without system magic quotes)
266 * @param mixed $newuser Userobject new modified userobject (without system magic quotes)
267 * @return boolean true if updated or update ignored; false if error
270 function user_update($olduser, $newuser) {
276 * User delete requested - internal user record is mared as deleted already, username not present anymore.
278 * Do any action in external database.
280 * @param object $user Userobject before delete (without system magic quotes)
283 function user_delete($olduser) {
289 * Returns true if plugin allows resetting of internal password.
293 function can_reset_password() {
299 * Returns true if plugin allows resetting of internal password.
303 function can_signup() {
309 * Sign up a new user ready for confirmation.
310 * Password is passed in plaintext.
312 * @param object $user new user object
313 * @param boolean $notify print notice with link and terminate
315 function user_signup($user, $notify=true) {
316 //override when can signup
317 print_error('mustbeoveride', 'debug', '', 'user_signup()' );
321 * Return a form to capture user details for account creation.
322 * This is used in /login/signup.php.
323 * @return moodle_form A form which edits a record from the user table.
325 function signup_form() {
328 require_once($CFG->dirroot
.'/login/signup_form.php');
329 return new login_signup_form(null, null, 'post', '', array('autocomplete'=>'on'));
333 * Returns true if plugin allows confirming of new users.
337 function can_confirm() {
343 * Confirm the new user as registered.
345 * @param string $username
346 * @param string $confirmsecret
348 function user_confirm($username, $confirmsecret) {
349 //override when can confirm
350 print_error('mustbeoveride', 'debug', '', 'user_confirm()' );
354 * Checks if user exists in external db
356 * @param string $username (with system magic quotes)
359 function user_exists($username) {
365 * return number of days to user password expires
367 * If userpassword does not expire it should return 0. If password is already expired
368 * it should return negative value.
370 * @param mixed $username username (with system magic quotes)
373 function password_expire($username) {
377 * Sync roles for this user - usually creator
379 * @param $user object user object (without system magic quotes)
381 function sync_roles($user) {
386 * Read user information from external database and returns it as array().
387 * Function should return all information available. If you are saving
388 * this information to moodle user-table you should honour synchronisation flags
390 * @param string $username username
392 * @return mixed array with no magic quotes or false on error
394 function get_userinfo($username) {
400 * Prints a form for configuring this authentication plugin.
402 * This function is called from admin/auth.php, and outputs a full page with
403 * a form for configuring this plugin.
405 * @param object $config
407 * @param array $user_fields
409 function config_form($config, $err, $user_fields) {
414 * A chance to validate form data, and last chance to
415 * do stuff before it is inserted in config_plugin
416 * @param object object with submitted configuration settings (without system magic quotes)
417 * @param array $err array of error messages
419 function validate_form($form, &$err) {
424 * Processes and stores configuration data for this authentication plugin.
426 * @param object object with submitted configuration settings (without system magic quotes)
428 function process_config($config) {
434 * Hook for overriding behaviour of login page.
435 * This method is called from login/index.php page for all enabled auth plugins.
440 function loginpage_hook() {
441 global $frm; // can be used to override submitted login form
442 global $user; // can be used to replace authenticate_user_login()
448 * Hook for overriding behaviour before going to the login page.
450 * This method is called from require_login from potentially any page for
451 * all enabled auth plugins and gives each plugin a chance to redirect
452 * directly to an external login page, or to instantly login a user where
455 * If an auth plugin implements this hook, it must not rely on ONLY this
456 * hook in order to work, as there are many ways a user can browse directly
457 * to the standard login page. As a general rule in this case you should
458 * also implement the loginpage_hook as well.
461 function pre_loginpage_hook() {
462 // override if needed, eg by redirecting to an external login page
463 // or logging in a user:
464 // complete_user_login($user);
468 * Pre user_login hook.
469 * This method is called from authenticate_user_login() right after the user
470 * object is generated. This gives the auth plugins an option to make adjustments
471 * before the verification process starts.
473 * @param object $user user object, later used for $USER
475 public function pre_user_login_hook(&$user) {
476 // Override if needed.
480 * Post authentication hook.
481 * This method is called from authenticate_user_login() for all enabled auth plugins.
483 * @param object $user user object, later used for $USER
484 * @param string $username (with system magic quotes)
485 * @param string $password plain text password (with system magic quotes)
487 function user_authenticated_hook(&$user, $username, $password) {
493 * This method is called from require_logout() for all enabled auth plugins,
497 function prelogout_hook() {
498 global $USER; // use $USER->auth to find the plugin used for login
504 * Hook for overriding behaviour of logout page.
505 * This method is called from login/logout.php page for all enabled auth plugins.
510 function logoutpage_hook() {
511 global $USER; // use $USER->auth to find the plugin used for login
512 global $redirect; // can be used to override redirect after logout
518 * Hook called before timing out of database session.
519 * This is useful for SSO and MNET.
521 * @param object $user
522 * @param string $sid session id
523 * @param int $timecreated start of session
524 * @param int $timemodified user last seen
525 * @return bool true means do not timeout session yet
527 function ignore_timeout_hook($user, $sid, $timecreated, $timemodified) {
532 * Return the properly translated human-friendly title of this auth plugin
534 * @todo Document this function
536 function get_title() {
537 return get_string('pluginname', "auth_{$this->authtype}");
541 * Get the auth description (from core or own auth lang files)
543 * @return string The description
545 function get_description() {
546 $authdescription = get_string("auth_{$this->authtype}description", "auth_{$this->authtype}");
547 return $authdescription;
551 * Returns whether or not the captcha element is enabled.
553 * @abstract Implement in child classes
556 function is_captcha_enabled() {
561 * Returns whether or not this authentication plugin can be manually set
562 * for users, for example, when bulk uploading users.
564 * This should be overriden by authentication plugins where setting the
565 * authentication method manually is allowed.
570 function can_be_manually_set() {
571 // Override if needed.
576 * Returns a list of potential IdPs that this authentication plugin supports.
577 * This is used to provide links on the login page.
579 * @param string $wantsurl the relative url fragment the user wants to get to. You can use this to compose a returnurl, for example
581 * @return array like:
584 * 'url' => 'http://someurl',
585 * 'icon' => new pix_icon(...),
586 * 'name' => get_string('somename', 'auth_yourplugin'),
590 function loginpage_idp_list($wantsurl) {
595 * Return custom user profile fields.
597 * @return array list of custom fields.
599 public function get_custom_user_profile_fields() {
601 // If already retrieved then return.
602 if (!is_null($this->customfields
)) {
603 return $this->customfields
;
606 $this->customfields
= array();
607 if ($proffields = $DB->get_records('user_info_field')) {
608 foreach ($proffields as $proffield) {
609 $this->customfields
[] = 'profile_field_'.$proffield->shortname
;
614 return $this->customfields
;
620 * This method is used after moodle logout by auth classes to execute server logout.
622 * @param stdClass $user clone of USER object before the user session was terminated
624 public function postlogout_hook($user) {
629 * Verify if user is locked out.
631 * @param stdClass $user
632 * @return bool true if user locked out
634 function login_is_lockedout($user) {
637 if ($user->mnethostid
!= $CFG->mnet_localhost_id
) {
640 if (isguestuser($user)) {
644 if (empty($CFG->lockoutthreshold
)) {
645 // Lockout not enabled.
649 if (get_user_preferences('login_lockout_ignored', 0, $user)) {
650 // This preference may be used for accounts that must not be locked out.
654 $locked = get_user_preferences('login_lockout', 0, $user);
659 if (empty($CFG->lockoutduration
)) {
660 // Locked out forever.
664 if (time() - $locked < $CFG->lockoutduration
) {
668 login_unlock_account($user);
674 * To be called after valid user login.
675 * @param stdClass $user
677 function login_attempt_valid($user) {
680 // Note: user_loggedin event is triggered in complete_user_login().
682 if ($user->mnethostid
!= $CFG->mnet_localhost_id
) {
685 if (isguestuser($user)) {
689 // Always unlock here, there might be some race conditions or leftovers when switching threshold.
690 login_unlock_account($user);
694 * To be called after failed user login.
695 * @param stdClass $user
697 function login_attempt_failed($user) {
700 if ($user->mnethostid
!= $CFG->mnet_localhost_id
) {
703 if (isguestuser($user)) {
707 $count = get_user_preferences('login_failed_count', 0, $user);
708 $last = get_user_preferences('login_failed_last', 0, $user);
709 $sincescuccess = get_user_preferences('login_failed_count_since_success', $count, $user);
710 $sincescuccess = $sincescuccess +
1;
711 set_user_preference('login_failed_count_since_success', $sincescuccess, $user);
713 if (empty($CFG->lockoutthreshold
)) {
714 // No threshold means no lockout.
715 // Always unlock here, there might be some race conditions or leftovers when switching threshold.
716 login_unlock_account($user);
720 if (!empty($CFG->lockoutwindow
) and time() - $last > $CFG->lockoutwindow
) {
726 set_user_preference('login_failed_count', $count, $user);
727 set_user_preference('login_failed_last', time(), $user);
729 if ($count >= $CFG->lockoutthreshold
) {
730 login_lock_account($user);
735 * Lockout user and send notification email.
737 * @param stdClass $user
739 function login_lock_account($user) {
742 if ($user->mnethostid
!= $CFG->mnet_localhost_id
) {
745 if (isguestuser($user)) {
749 if (get_user_preferences('login_lockout_ignored', 0, $user)) {
750 // This user can not be locked out.
754 $alreadylockedout = get_user_preferences('login_lockout', 0, $user);
756 set_user_preference('login_lockout', time(), $user);
758 if ($alreadylockedout == 0) {
759 $secret = random_string(15);
760 set_user_preference('login_lockout_secret', $secret, $user);
762 $oldforcelang = force_current_language($user->lang
);
765 $supportuser = core_user
::get_support_user();
767 $data = new stdClass();
768 $data->firstname
= $user->firstname
;
769 $data->lastname
= $user->lastname
;
770 $data->username
= $user->username
;
771 $data->sitename
= format_string($site->fullname
);
772 $data->link
= $CFG->wwwroot
.'/login/unlock_account.php?u='.$user->id
.'&s='.$secret;
773 $data->admin
= generate_email_signoff();
775 $message = get_string('lockoutemailbody', 'admin', $data);
776 $subject = get_string('lockoutemailsubject', 'admin', format_string($site->fullname
));
779 // Directly email rather than using the messaging system to ensure its not routed to a popup or jabber.
780 email_to_user($user, $supportuser, $subject, $message);
783 force_current_language($oldforcelang);
788 * Unlock user account and reset timers.
790 * @param stdClass $user
792 function login_unlock_account($user) {
793 unset_user_preference('login_lockout', $user);
794 unset_user_preference('login_failed_count', $user);
795 unset_user_preference('login_failed_last', $user);
797 // Note: do not clear the lockout secret because user might click on the link repeatedly.
801 * Returns whether or not the captcha element is enabled, and the admin settings fulfil its requirements.
804 function signup_captcha_enabled() {
806 $authplugin = get_auth_plugin($CFG->registerauth
);
807 return !empty($CFG->recaptchapublickey
) && !empty($CFG->recaptchaprivatekey
) && $authplugin->is_captcha_enabled();
811 * Validates the standard sign-up data (except recaptcha that is validated by the form element).
813 * @param array $data the sign-up data
814 * @param array $files files among the data
815 * @return array list of errors, being the key the data element name and the value the error itself
818 function signup_validate_data($data, $files) {
822 $authplugin = get_auth_plugin($CFG->registerauth
);
824 if ($DB->record_exists('user', array('username' => $data['username'], 'mnethostid' => $CFG->mnet_localhost_id
))) {
825 $errors['username'] = get_string('usernameexists');
827 // Check allowed characters.
828 if ($data['username'] !== core_text
::strtolower($data['username'])) {
829 $errors['username'] = get_string('usernamelowercase');
831 if ($data['username'] !== core_user
::clean_field($data['username'], 'username')) {
832 $errors['username'] = get_string('invalidusername');
838 // Check if user exists in external db.
839 // TODO: maybe we should check all enabled plugins instead.
840 if ($authplugin->user_exists($data['username'])) {
841 $errors['username'] = get_string('usernameexists');
844 if (! validate_email($data['email'])) {
845 $errors['email'] = get_string('invalidemail');
847 } else if ($DB->record_exists('user', array('email' => $data['email']))) {
848 $errors['email'] = get_string('emailexists').' <a href="forgot_password.php">'.get_string('newpassword').'?</a>';
850 if (empty($data['email2'])) {
851 $errors['email2'] = get_string('missingemail');
853 } else if ($data['email2'] != $data['email']) {
854 $errors['email2'] = get_string('invalidemail');
856 if (!isset($errors['email'])) {
857 if ($err = email_is_not_allowed($data['email'])) {
858 $errors['email'] = $err;
863 if (!check_password_policy($data['password'], $errmsg)) {
864 $errors['password'] = $errmsg;
867 // Validate customisable profile fields. (profile_validation expects an object as the parameter with userid set).
868 $dataobject = (object)$data;
870 $errors +
= profile_validation($dataobject, $files);
876 * Add the missing fields to a user that is going to be created
878 * @param stdClass $user the new user object
879 * @return stdClass the user filled
882 function signup_setup_new_user($user) {
885 $user->confirmed
= 0;
886 $user->lang
= current_language();
887 $user->firstaccess
= 0;
888 $user->timecreated
= time();
889 $user->mnethostid
= $CFG->mnet_localhost_id
;
890 $user->secret
= random_string(15);
891 $user->auth
= $CFG->registerauth
;
892 // Initialize alternate name fields to empty strings.
893 $namefields = array_diff(get_all_user_name_fields(), useredit_get_required_name_fields());
894 foreach ($namefields as $namefield) {
895 $user->$namefield = '';
901 * Check if user confirmation is enabled on this site and return the auth plugin handling registration if enabled.
903 * @return stdClass the current auth plugin handling user registration or false if registration not enabled
906 function signup_get_user_confirmation_authplugin() {
909 if (empty($CFG->registerauth
)) {
912 $authplugin = get_auth_plugin($CFG->registerauth
);
914 if (!$authplugin->can_confirm()) {
921 * Check if sign-up is enabled in the site. If is enabled, the function will return the authplugin instance.
923 * @return mixed false if sign-up is not enabled, the authplugin instance otherwise.
926 function signup_is_enabled() {
929 if (!empty($CFG->registerauth
)) {
930 $authplugin = get_auth_plugin($CFG->registerauth
);
931 if ($authplugin->can_signup()) {