attrs['uid'][0])){ $this->uid = $this->attrs['uid'][0]; } // Get samba domain and its sid/rid base if ($this->sambaSID != ""){ $this->SID= preg_replace ("/-[^-]+$/", "", $this->sambaSID); $ldap= $this->config->get_ldap_link(); $ldap->cd($this->config->current['BASE']); $ldap->search ("(&(objectClass=sambaDomain)(sambaSID=$this->SID))",array("sambaAlgorithmicRidBase","sambaDomainName")); if ($ldap->count() != 0){ $attrs= $ldap->fetch(); if(isset($attrs['sambaAlgorithmicRidBase'])){ $this->ridBase= $attrs['sambaAlgorithmicRidBase'][0]; } else { $this->ridBase= $this->config->get_cfg_value("core","sambaRidBase"); } if ($this->sambaDomainName == ""){ $this->sambaDomainName= $attrs['sambaDomainName'][0]; } } else { // Fall back to a 'DEFAULT' domain, if none was found in LDAP. if ($this->sambaDomainName == "") $this->sambaDomainName= "DEFAULT"; // Nothing in ldap, use configured sid and rid values. $this->ridBase= $this->config->get_cfg_value("core","sambaRidBase"); $this->SID= $this->config->get_cfg_value("core","sambaSid"); } } // Keep original domain name and plugin status, to be able to detect modifications. $this->orig_sambaDomainName= $this->sambaDomainName; $this->initially_was_account= $this->is_account; // Instantiate munged object and load info. $this->mungedObject= new sambaMungedDial; $this->ctxattributes= $this->mungedObject->ctxattributes; if (isset($this->attrs['sambaMungedDial'])){ $this->mungedObject->load($this->sambaMungedDial); } // Load flags $this->loadFlagsFromSource($this->attrs); } function loadFlagsFromSource($attrs) { // Samba flag description // ---------------------- // The Official Samba 3.2.x HOWTO and Reference Guide // Jelmer R. Vernooij, John H. Terpstra, and Gerald (Jerry) Carter // May 27, 2009 // ---------------------- // D - Account is disabled. // H - A home directory is required. // I - An inter-domain trust account. // L - Account has been auto-locked. // M - An MNS (Microsoft network service) logon account. // N - Password not required. // S - A server trust account. // T - Temporary duplicate account entry. // U - A normal user account. // W - A workstation trust account. // X - Password does not expire. // sambaPwdCanChange // _______________ // Specifies the time (UNIX time format) after which the user is allowed to change his password. // If this attribute is not set, the user will be free to change his password whenever he wants. // sambaPwdLastSet // _______________ // The integer time in seconds since 1970 when the sambaLMPassword and sambaNTPassword attributes were last set. // sambaPwdMustChange // _______________ // Specifies the time (UNIX time format) when the user is forced to change his password. If this // value is set to 0, the user will have to change his password at first login. If this attribute is not // set, then the password will never expire. // A password change is enforced by using a timestamp in sambaPwdMustChange. // We simple set it to '0' to enforce a change. // -------------------------------- // Normally it contains a timestamp, which specifies and expiration date. $this->flag_enforcePasswordChange = (isset($attrs['sambaPwdMustChange']) && $attrs['sambaPwdMustChange'][0] == '0'); // A user cannot change his password until the given timestamp has reached. // We simply set it to max int to disallow a password change till the timestamp reaches 4294967295, // this is definitly far in the future and thus disallows a password change at all. // -------------------------------- // The user is not able to change his password while sambaPwdCanChange is 4294967295 (Integer 32 Bit max) $this->flag_cannotChangePassword = (isset($attrs['sambaPwdCanChange']) && $attrs['sambaPwdCanChange'][0] == '4294967295'); // Load samba account flags if(isset($attrs['sambaAcctFlags'][0])){ $this->sambaAcctFlags = $attrs['sambaAcctFlags'][0]; // A password never expires if 'sambaAcctFlags' contains 'X'. // (See flags above for details) $this->flag_passwordNeverExpires = preg_match("/X/i", $this->sambaAcctFlags); // A password is NOT required if 'sambaAcctFlags' contains 'N'. // (See flags above for details) $this->flag_noPasswordRequired = preg_match("/N/i", $this->sambaAcctFlags); // A account is locked if if 'sambaAcctFlags' contains 'L' or 'D'. // (See flags above for details) $this->flag_temporaryDisabled = preg_match("/L/i", $this->sambaAcctFlags) || preg_match("/D/i", $this->sambaAcctFlags); } } function execute() { /* Call parent execute */ plugin::execute(); /* Log view */ if($this->is_account && !$this->view_logged){ $this->view_logged = TRUE; new log("view","users/".get_class($this),$this->dn); } /* Do we need to flip is_account state? */ if (isset($_POST['modify_state'])){ $this->is_account= !$this->is_account; } /* Do we represent a valid account? */ if (!$this->is_account && $this->parent === NULL){ $display= " ". msgPool::noValidExtension(_("Samba")).""; $display.= back_to_main(); return ($display); } $display =""; if(!$this->multiple_support_active){ // Show tab heades to activate and deactivate the samba extension. $display= ""; if ($this->parent !== NULL){ if ($this->is_account){ $display= $this->show_disable_header(msgPool::removeFeaturesButton(_("Samba")), msgPool::featuresEnabled(_("Samba"))); } else { // Samba3 dependency on posix accounts are enabled in the moment, because I need to rely on unique // uidNumbers. There'll be a better solution later on. $obj= $this->parent->by_object['posixAccount']; if ($obj->is_account){ $display= $this->show_enable_header(msgPool::addFeaturesButton(_("Samba")), msgPool::featuresDisabled(_("Samba"))); } else { $display= $this->show_enable_header(msgPool::addFeaturesButton(_("Samba")), msgPool::featuresDisabled(_("Samba"), _("POSIX")), TRUE); } return ($display); } } } // Editing from the MyAccount/Personal section may be disabled until we've pressed the 'edit' button. $SkipWrite = (!isset($this->parent) || !$this->parent) && !session::is_set('edit'); // Handle the samba logon hours dialog here, instantiate it on request. if(isset($_POST['SetSambaLogonHours']) && $this->acl_is_readable("sambaLogonHours")){ $this->dialog = new sambaLogonHours($this->config,$this->dn,$this->sambaLogonHours, $this->getacl('sambaLogonHours')); } if(isset($_POST['cancel_logonHours'])){ $this->dialog = FALSE; } if(isset($_POST['save_logonHours'])){ $this->dialog->save_object(); if($this->acl_is_writeable("sambaLogonHours")){ $this->sambaLogonHours = $this->dialog->save(); } $this->dialog = FALSE; } if((isset($this->dialog)) && (is_object($this->dialog))){ $this->dialog->save_object(); return($this->dialog->execute()); } // Get smarty $smarty= get_smarty(); $smarty->assign("usePrototype", "true"); // Assign GOsa ACLs $tmp = $this->plInfo(); foreach($tmp['plProvidedAcls'] as $var => $rest){ $smarty->assign($var."ACL",$this->getacl($var,$SkipWrite)); } if(!session::is_set('edit') && !isset($this->parent)){ $smarty->assign("sambaLogonHoursACL",""); } // Handle workstation list - Remove entries. if (isset($_POST["delete_ws"]) && isset($_POST['workstation_list'])){ if($this->acl_is_writeable("sambaUserWorkstations",$SkipWrite)){ if($this->multiple_support_active){ foreach($_POST['workstation_list'] as $name){ if(isset($this->multiple_sambaUserWorkstations[trim($name)])){ unset($this->multiple_sambaUserWorkstations[trim($name)]); } } }else{ $tmp= $this->sambaUserWorkstations; foreach($_POST['workstation_list'] as $name){ $tmp= preg_replace("/$name/", '', $tmp); $this->is_modified= TRUE; } $tmp= preg_replace('/,+/', ',', $tmp); $this->sambaUserWorkstations= trim($tmp, ','); } } } // Handle trust maschines/accessTo list if (isset($_POST["add_ws"])){ if($this->acl_is_writeable("sambaUserWorkstations",$SkipWrite)){ $this->trustSelect= new trustSelect($this->config,get_userinfo()); $this->dialog= TRUE; } } // Dialog canceled if (isset($_POST["add_ws_cancel"])){ $this->trustSelect= FALSE; $this->dialog= FALSE; } // Add selected machines to trusted ones. if (isset($_POST["add_ws_finish"]) && $this->trustSelect){ $trusts = $this->trustSelect->detectPostActions(); if(isset($trusts['targets'])){ $headpage = $this->trustSelect->getHeadpage(); if($this->multiple_support_active){ foreach($trusts['targets'] as $id){ $attrs = $headpage->getEntry($id); $we =$attrs['cn'][0]; $this->multiple_sambaUserWorkstations[trim($we)] = array("Name" => trim($ws), "UsedByAllUsers" => TRUE); } }else{ $tmp= $this->sambaUserWorkstations; foreach($trusts['targets'] as $id){ $attrs = $headpage->getEntry($id); $we =$attrs['cn'][0]; $tmp.= ",$we"; } $tmp= preg_replace('/,+/', ',', $tmp); $this->sambaUserWorkstations= trim($tmp, ','); } $this->is_modified= TRUE; } $this->trustSelect= NULL; $this->dialog= FALSE; } // Display trust dialog if ($this->trustSelect){ session::set('filterBlacklist', array('cn' => preg_split('/,/',$this->sambaUserWorkstations))); return($this->trustSelect->execute()); } // Fill domain selection. $domains= array_keys($this->config->data['SERVERS']['SAMBA']); $smarty->assign("domains", set_post($domains)); // Fill drive letters. $letters= array(""); for ($i= 68; $i<91; $i++){ $letters[]= chr($i).":"; } $smarty->assign("drives", $letters); // Fill terminal server setttings foreach ($this->ctxattributes as $attr){ if (isset($this->mungedObject->ctx[$attr])){ $smarty->assign("$attr", set_post($this->mungedObject->ctx[$attr])); // Set field to blank if value is 0 if(in_array($attr, array("CtxMaxConnectionTime", "CtxMaxDisconnectionTime", "CtxMaxIdleTime"))) { if($this->mungedObject->ctx[$attr] == 0) { $smarty->assign("$attr", ""); } } } else { $smarty->assign("$attr", ""); } } // Assign enum values for preset items. $shadowModeVals= array( "0" => _("disabled"), "1" => _("input on, notify on"), "2" => _("input on, notify off"), "3" => _("input off, notify on"), "4" => _("input off, notify off")); $brokenConnModeVals= array( "0" => _("disconnect"), "1" => _("reset")); $reConnModeVals= array( "0" => _("from any client"), "1" => _("from previous client only")); $smarty->assign("shadow", set_post($shadowModeVals)); $smarty->assign("brokenconn", set_post($brokenConnModeVals)); $smarty->assign("reconn", set_post($reConnModeVals)); // Fill preset items with values $smarty->assign("shadowmode", set_post($this->mungedObject->getShadow())); $smarty->assign("brokenconnmode", set_post($this->mungedObject->getBrokenConn())); $smarty->assign("reconnmode", set_post($this->mungedObject->getReConn())); // Set form elements to disabled/enable state $smarty->assign("tsloginstate", $this->mungedObject->getTsLogin()?"":"disabled"); $smarty->assign("inheritstate", ""); if($this->acl_is_writeable("AllowLoginOnTerminalServer",$SkipWrite)){ $smarty->assign("inheritstate", $this->mungedObject->getInheritMode()?"disabled":""); } // Set checkboxes to checked or unchecked state $smarty->assign("tslogin", $this->mungedObject->getTsLogin()?"checked":""); $smarty->assign("inherit", $this->mungedObject->getInheritMode()?"checked":""); $smarty->assign("connectclientdrives", $this->mungedObject->getConnectClientDrives()?"checked":""); $smarty->assign("connectclientprinters", $this->mungedObject->getConnectClientPrinters()?"checked":""); $smarty->assign("defaultprinter", $this->mungedObject->getDefaultPrinter()?"checked":""); $smarty->assign("CtxMaxConnectionTimeF", $this->mungedObject->getCtxMaxConnectionTimeF()?"checked":""); $smarty->assign("CtxMaxDisconnectionTimeF", $this->mungedObject->getCtxMaxDisconnectionTimeF()?"checked":""); $smarty->assign("CtxMaxIdleTimeF", $this->mungedObject->getCtxMaxIdleTimeF()?"checked":""); // Fill sambaUserWorkstations $ws= explode(",", $this->sambaUserWorkstations); sort($ws); // Tidy checks for empty option, and smarty will produce one if array[0]="" if(($ws[0]=="")&&(count($ws)==1)) $ws=array(); if($this->multiple_support_active){ $smarty->assign("multiple_workstations",$this->multiple_sambaUserWorkstations); } $smarty->assign("workstations", set_post($ws)); // Assign plugin values foreach($this->attributes as $val){ $smarty->assign("$val", set_post($this->$val)); } // Assign munged attributes foreach($this->mungedObject->getOnDemandFlags() as $key => $value) { $smarty->assign("$key", set_post($value)); } // Assign selected multi edit checkbox values. foreach($this->attributes as $attr){ if(in_array($attr,$this->multi_boxes)){ $smarty->assign("use_".$attr,TRUE); }else{ $smarty->assign("use_".$attr,FALSE); } } foreach(array("tslogin","CtxWFHomeDir","CtxWFHomeDirDrive","CtxWFProfilePath", "inherit","CtxWorkDirectory","CtxInitialProgram","CtxMaxConnectionTimeF", "CtxMaxConnectionTime","CtxMaxDisconnectionTimeF", "CtxMaxDisconnectionTime","CtxMaxIdleTimeF","CtxMaxIdleTime","connectclientdrives", "onnectclientprinters","defaultprinter","shadow","brokenconn", "reconn","connectclientprinters","SetSambaLogonHours", "workstation_list", "enforcePasswordChange", "passwordNeverExpires", "noPasswordRequired", "temporaryDisabled","cannotChangePassword") as $attr){ if(in_array($attr,$this->multi_boxes)){ $smarty->assign("use_".$attr,TRUE); }else{ $smarty->assign("use_".$attr,FALSE); } } if($this->multiple_support_active){ $smarty->assign("tsloginstate",""); } // Create additional info for sambaKickOffTime and sambaPwdMustChange. // e.g. Display effective kickoff time. Domain policy + user settings. $additional_info_PwdMustChange = ""; // Calculate effective max Password Age // This can only be calculated if sambaPwdLastSet ist set. if(isset($this->attrs['sambaPwdLastSet'][0])){ $last = $this->attrs['sambaPwdLastSet'][0]; $sid = $this->get_domain_info(); if(isset($sid['sambaMaxPwdAge'][0])){ $d = ($last + $sid['sambaMaxPwdAge'][0]) - time(); // A negative value means the password is outdated if($d < 0){ $additional_info_PwdMustChange = sprintf(_("The password is outdated since %s, by domain policy."), date("d.m.Y H:i:s",$last + $sid['sambaMaxPwdAge'][0])); }else{ $additional_info_PwdMustChange = sprintf(_("The password is valid till %s."), date("d.m.Y H:i:s", ($last + $sid['sambaMaxPwdAge'][0]))); } } } // Assign flags foreach(array("flag_enforcePasswordChange", "flag_passwordNeverExpires", "flag_noPasswordRequired", "flag_temporaryDisabled","flag_cannotChangePassword") as $attr){ $smarty->assign($attr, set_post($this->$attr)); } $smarty->assign("additional_info_PwdMustChange",set_post($additional_info_PwdMustChange)); $smarty->assign("multiple_support",$this->multiple_support_active); $display.= $smarty->fetch (get_template_path('samba3.tpl', TRUE, dirname(__FILE__))); return ($display); } /*! \brief Returns the samba Domain object, selected in the samba tab. */ function get_domain_info() { /* Only search once, return last result if available */ if(!isset($this->cache['DOMAIN'][$this->sambaDomainName])){ $this->cache['DOMAIN'][$this->sambaDomainName] = array(); if(!empty($this->sambaDomainName) && isset($this->config->data['SERVERS']['SAMBA'][$this->sambaDomainName])){ $cfg = $this->config->data['SERVERS']['SAMBA'][$this->sambaDomainName]; $ldap = $this->config->get_ldap_link(); $ldap->cd($this->config->current['BASE']); $ldap->search("(&(objectClass=sambaDomain)(sambaSID=".$cfg['SID']."))",array("*")); if($ldap->count()){ $this->cache['DOMAIN'][$this->sambaDomainName] = $ldap->fetch(); } } } return($this->cache['DOMAIN'][$this->sambaDomainName]); } function get_samba_information() { $zone = timezone::get_default_timezone(); /* Defaults */ $sambaMinPwdLength = "unset"; $sambaPwdHistoryLength = "unset"; $sambaLogonToChgPwd = "unset"; $sambaMaxPwdAge = "unset"; $sambaMinPwdAge = "unset"; $sambaLockoutDuration = "unset"; $sambaLockoutThreshold = "unset"; $sambaForceLogoff = "unset"; $sambaRefuseMachinePwdChange = "unset"; $sambaPwdLastSet = "unset"; $sambaLogonTime = "unset"; $sambaLogoffTime = "unset"; $sambaKickoffTime = "unset"; $sambaPwdCanChange = "unset"; $sambaPwdMustChange = "unset"; $sambaBadPasswordCount = "unset"; $sambaBadPasswordTime = "unset"; /* Domain attributes */ $domain_attributes = array("sambaMinPwdLength","sambaPwdHistoryLength","sambaMaxPwdAge", "sambaMinPwdAge","sambaLockoutDuration","sambaRefuseMachinePwdChange", "sambaLogonToChgPwd","sambaLockoutThreshold","sambaForceLogoff"); /* User attributes */ $user_attributes = array("sambaBadPasswordTime","sambaPwdLastSet","sambaLogonTime","sambaLogoffTime", "sambaKickoffTime","sambaPwdCanChange","sambaPwdMustChange","sambaBadPasswordCount", "sambaSID"); /* Get samba SID object and parse settings. */ $ldap = $this->config->get_ldap_link(); $ldap->cd($this->config->current['BASE']); if(!empty($this->sambaDomainName) && isset($this->config->data['SERVERS']['SAMBA'][$this->sambaDomainName])){ $attrs = $this->get_domain_info(); foreach($domain_attributes as $attr){ if(isset($attrs[$attr])){ $$attr = $attrs[$attr][0]; } } } /* Get user infos */ foreach($user_attributes as $attr){ if(isset($this->attrs[$attr])){ $$attr = $this->attrs[$attr][0]; } } if (is_numeric($sambaPwdMustChange)) { $sambaPwdMustChange= date('d.m.Y', $sambaPwdMustChange); } if (is_numeric($sambaKickoffTime)) { $sambaKickoffTime= date('d.m.Y', $sambaKickoffTime); } $sambaPwdCanChange = $this->sambaPwdCanChange; /* DOMAIN Attributes */ /* sambaMinPwdLength: Password length has a default of 5 */ if($sambaMinPwdLength == "unset" || $sambaMinPwdLength == 5){ $sambaMinPwdLength = "5 ("._("default").")"; } /* sambaPwdHistoryLength: Length of Password History Entries (default: 0 => off) */ if($sambaPwdHistoryLength == "unset" || $sambaPwdHistoryLength == 0){ $sambaPwdHistoryLength = _("Off")." ("._("default").")"; } /* sambaLogonToChgPwd: Force Users to logon for password change (default: 0 => off, 2 => on) */ if($sambaLogonToChgPwd == "unset" || $sambaLogonToChgPwd == 0){ $sambaLogonToChgPwd = _("Off")." ("._("default").")"; }else{ $sambaLogonToChgPwd = _("On"); } /* sambaMaxPwdAge: Maximum password age, in seconds (default: -1 => never expire passwords)' */ if($sambaMaxPwdAge == "unset" || $sambaMaxPwdAge == "-1"){ $sambaMaxPwdAge = _("disabled")." ("._("default").")"; }else{ $sambaMaxPwdAge .= " "._("seconds"); } /* sambaMinPwdAge: Minimum password age, in seconds (default: 0 => allow immediate password change */ if($sambaMinPwdAge == "unset" || $sambaMinPwdAge == 0){ $sambaMinPwdAge = _("disabled")." ("._("default").")"; }else{ $sambaMinPwdAge .= " "._("seconds"); } /* sambaLockoutDuration: Lockout duration in minutes (default: 30, -1 => forever) */ if($sambaLockoutDuration == "unset" || $sambaLockoutDuration == 30){ $sambaLockoutDuration = "30 "._("minutes")." ("._("default").")"; }elseif($sambaLockoutDuration == -1){ $sambaLockoutDuration = _("forever"); }else{ $sambaLockoutDuration .= " "._("minutes"); } /* sambaLockoutThreshold: Lockout users after bad logon attempts (default: 0 => off */ if($sambaLockoutThreshold == "unset" || $sambaLockoutThreshold == 0){ $sambaLockoutThreshold = _("disabled")." ("._("default").")"; } /* sambaForceLogoff: Disconnect Users outside logon hours (default: -1 => off, 0 => on */ if($sambaForceLogoff == "unset" || $sambaForceLogoff == -1){ $sambaForceLogoff = _("off")." ("._("default").")"; }else{ $sambaForceLogoff = _("on"); } /* sambaRefuseMachinePwdChange: Allow Machine Password changes (default: 0 => off */ if($sambaRefuseMachinePwdChange == "none" || $sambaRefuseMachinePwdChange == 0){ $sambaRefuseMachinePwdChange = _("off")." ("._("default").")"; }else{ $sambaRefuseMachinePwdChange = _("on"); } /* USER Attributes */ /* sambaBadPasswordTime: Time of the last bad password attempt */ if($sambaBadPasswordTime == "unset" || empty($sambaBadPasswordTime)){ $sambaBadPasswordTime = "("._("unset").")"; }else{ $sambaBadPasswordTime = date("d.m.Y H:i:s",$sambaBadPasswordTime); } /* sambaBadPasswordCount: Bad password attempt count */ if($sambaBadPasswordCount == "unset" || empty($sambaBadPasswordCount)){ $sambaBadPasswordCount = "("._("unset").")"; }else{ $sambaBadPasswordCount = date("d.m.Y H:i:s",$sambaBadPasswordCount); } /* sambaPwdLastSet: Timestamp of the last password update */ if($sambaPwdLastSet == "unset" || empty($sambaPwdLastSet)){ $sambaPwdLastSet = "("._("unset").")"; }else{ $sambaPwdLastSet = date("d.m.Y H:i:s",$sambaPwdLastSet); } /* sambaLogonTime: Timestamp of last logon */ if($sambaLogonTime == "unset" || empty($sambaLogonTime)){ $sambaLogonTime = "("._("unset").")"; }else{ $sambaLogonTime = date("d.m.Y H:i:s",$sambaLogonTime); } /* sambaLogoffTime: Timestamp of last logoff */ if($sambaLogoffTime == "unset" || empty($sambaLogoffTime)){ $sambaLogoffTime = "("._("unset").")"; }else{ $sambaLogoffTime = date("d.m.Y H:i:s",$sambaLogoffTime); } /* sambaKickoffTime: Timestamp of when the user will be logged off automatically */ if($sambaKickoffTime == "unset" || empty($sambaKickoffTime)){ $sambaKickoffTime = "("._("unset").")"; } /* sambaPwdMustChange: Timestamp of when the password will expire */ if($sambaPwdMustChange == "unset" || empty($sambaPwdMustChange)){ $sambaPwdMustChange = "("._("unset").")"; } /* sambaPwdCanChange: Timestamp of when the user is allowed to update the password */ if($sambaPwdCanChange == "unset" || empty($sambaPwdCanChange)){ $sambaPwdCanChange = "("._("unset").")"; }elseif($sambaPwdCanChange != "unset" && time() > $sambaPwdCanChange){ $sambaPwdCanChange = _("immediately") ; }else{ $days = floor((($sambaPwdCanChange - time()) / 60 / 60 / 24)) ; $hours = floor((($sambaPwdCanChange - time()) / 60 / 60) % 24) ; $minutes = floor((($sambaPwdCanChange - time()) / 60 ) % 60) ; $sambaPwdCanChange = " ".$days." "._("days"); $sambaPwdCanChange.= " ".$hours." "._("hours"); $sambaPwdCanChange.= " ".$minutes." "._("minutes"); } $str = "\n
"._("Domain attributes")." | |
"._("Min password length").": | ".$sambaMinPwdLength." |
"._("Min password length").": | ".$sambaMinPwdLength." |
"._("Password history").": | ".$sambaPwdHistoryLength." |
"._("Force password change").": | ".$sambaLogonToChgPwd." |
"._("Maximum password age").": | ".$sambaMaxPwdAge." |
"._("Minimum password age").": | ".$sambaMinPwdAge." |
"._("Lockout duration").": | ".$sambaLockoutDuration." |
"._("Bad lockout attempt").": | ".$sambaLockoutThreshold." |
"._("Disconnect time").": | ".$sambaForceLogoff." |
"._("Refuse machine password change").": | ".$sambaRefuseMachinePwdChange." |
"._("User attributes")." | |
"._("SID").": | ".$sambaSID." |
"._("Last failed login").": | ".$sambaBadPasswordTime." |
"._("Log on attempts").": | ".$sambaBadPasswordCount." |
"._("Last password update").": | ".$sambaPwdLastSet." |
"._("Last log on").": | ".$sambaLogonTime." |
"._("Last log off").": | ".$sambaLogoffTime." |
"._("Automatic log off").": | ".$sambaKickoffTime." |
"._("Password expires").": | "._("No")." |
". sprintf(_("The password would expire on %s, but the password expiry is disabled."),$sambaPwdMustChange). " | |
"._("Password expires").": | ".$sambaPwdMustChange." |
"._("Password change available").": | ".$sambaPwdCanChange." |