This project is not covered by Drupal’s security advisory policy.

ACS Technologies ChMS

This project' provides a set of modules integrating Drupal with the ACS Technologies Church Management System (ChMS). The project currently consists of the following modules.


The ACS module provides some core integration features with ACS and documentation about integrating with ACS. It provides a core admin page, with the expectation that add on modules will be added as tabs off this page. Beyond this it is a developer module / API module meant for other modules to take advantage of.

Developer documentation is available API.txt file and acs.api.php file.

ACS Authentication

The ACS Auth module allows users to login to the Drupal site with ACS usernames and passwords. When a user logs in for the first time a local user account is created.

There are two types of authentication provided with the module. One is to exclusively login with ACS accounts and the other provides mixed logins with local users and ACS users.

This is an extensible module. If developers want to provide a different authentication or user creation logic they can. For more detail see the API.txt and acs_auth.api.php files.

Continued Development

There are couple ways you can help continued development.

Develop Patches/Modules and Report Issues

These modules were meant to be used and extended to provide more features. You can help out by writing modules and reporting issues.

Provide Financial Support

The work completed so far has been accomplished thanks to financial support form the community. If you would like contribute you can use this chipin page or contact Mustardseed Media.

The next development planned steps:

  • Profile integration.
  • Port to Drupal 7.

Once these features are complete, more will be added. Next stages will focus on event integration and registrations.

Module Requirements

The ACS module for Drupal 6 requires the following:

Project information

  • chart icon2,277 downloads
  • shield alertThis project is not covered by the security advisory policy.
    Use at your own risk! It may have publicly disclosed vulnerabilities.