After you have enabled ACL in the config file you need to decide how you like to store user data. DokuWiki supports various methods and creating a new one is pretty easy.
DokuWiki uses so called authentication backends that provide certain methods to store user data and passwords. The user won't even see this backend but you as an administrator have to set up your desired authentication backend and configure it properly.
If the available backends does not fulfill the requirements, you can create your own backend. For details see How to write an Authentication Backend?
These Backends aren't part of the distribution, but might be useful:
Ban – More secure login with ban option (rewritten plain.auth.php)
CAS – authenticate with a CAS server
cas – another CAS authentication with
ACL based on LDAP attributes
chained – chain more than one authentication method
-
django – Authenticates against a Django user database through a Django session cookie.
Eventum – How to integrate DokuWiki with Eventum Issue Tracker
drupal – authenticate against a Drupal install
external – Authentication through an external program – to be used with PAM & shadow passwords
gforge – Authenticate against GForge session cookies
ggauth – experimental thoughts on auth backends including chained, split as below plus HTTP basic, htaccess and PAM
htaccessauth – identify users that already logged in using a Basic HTTP Authorization through .htaccess
imap – authenticate users against an IMAP/POP3 server
imap – Another (
awesome) IMAP authentication backend
-
ldap_local – LDAP authentication with local (plain text) ACLs
lemonldap – authenticate users through a LemonLDAP SSO
-
motp – basically like the plain backend but with added checks for Mobile-OTP tokens
mybb – authentication using the MyBB forum software
ning – Ning ID authentication
ntlm – NTLM (i.e. Windows NT-based) authentication
pam – Experimental PAM authentication
cafu_phpbb3 – authenticate users against a PHPBB3 forum
phpbb3 – authenticate users against a PHPBB3.0.x forum - another take on the matter
plainplus – extension to plaintext to limit bad password attempts and set expirations to passwords
punbb – authenticate users against the PunBB forum (uses PunBB's cookies and database for SSO)
radius – authenticate users against a RADIUS server
shibauth – Shibboleth Authentication Backend
split – delegate login to one auth backend and groups management to another
smartcard – use SmartCard for login (client certificate, developed for Estonian ID card). Supports multiple backends (plain, mysql and so on).
ssp – SimpleSAMLphp authentication backend
-
xmpp – authenticate users against an XMPP/Jabber server
yubikey – Extension to the paintext auth module to allow use of a
YubiKey OTP as the password
-
Ucenter – Discuz Ucenter Authentication backend.
-
How to implement a new auth backend is described in the HOWTO.