<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active Directory authentification in Alfresco Archive</title>
    <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205033#M158163</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;I just recently got AD authentication on my instance of Alfresco Labs3. &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;ldap.authentication.userNameFormat=sAMAccountName=%s&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; # The default principal to use (only used for LDAP sync)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ldap.authentication.java.naming.security.principal=cn=reader,ou=service,ou=admin,dc=company,dc=com&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; # The password for the default principal (only used for LDAP sync)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ldap.authentication.java.naming.security.credentials=***********&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;&lt;SPAN&gt;In the ldap-authentication.properties, I believe you should have the following: &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.userNameFormat=cn=%s,ou=&lt;/SPAN&gt;&lt;EM&gt;people&lt;/EM&gt;&lt;SPAN&gt;,ou=&lt;/SPAN&gt;&lt;EM&gt;admin&lt;/EM&gt;&lt;SPAN&gt;,dc=&lt;/SPAN&gt;&lt;EM&gt;company&lt;/EM&gt;&lt;SPAN&gt;,dc=&lt;/SPAN&gt;&lt;EM&gt;com&lt;/EM&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.security.principal=&lt;/SPAN&gt;&lt;EM&gt;userID that can be used to connect to AD &lt;/EM&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.security.credentials=&lt;/SPAN&gt;&lt;EM&gt;password for principal userID to connect with&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Hope that helps. It was how I configured it.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Apr 2009 20:27:29 GMT</pubDate>
    <dc:creator>rliu</dc:creator>
    <dc:date>2009-04-03T20:27:29Z</dc:date>
    <item>
      <title>Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205032#M158162</link>
      <description>Hello,We're using Alfresco Labs 3 final version and a shared tomcat (v.6) on Debian Etch.And we're trying to authentificate with an Active Directory account.Let the user called "Joe Black", his login is jblack and distinguishedName is CN=Joe Black,OU=marketing,OU=org1,DC=company,DC=comHe's connectin</description>
      <pubDate>Thu, 02 Apr 2009 15:42:18 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205032#M158162</guid>
      <dc:creator>francois12</dc:creator>
      <dc:date>2009-04-02T15:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205033#M158163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;I just recently got AD authentication on my instance of Alfresco Labs3. &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;ldap.authentication.userNameFormat=sAMAccountName=%s&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; # The default principal to use (only used for LDAP sync)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ldap.authentication.java.naming.security.principal=cn=reader,ou=service,ou=admin,dc=company,dc=com&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; # The password for the default principal (only used for LDAP sync)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ldap.authentication.java.naming.security.credentials=***********&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;&lt;SPAN&gt;In the ldap-authentication.properties, I believe you should have the following: &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.userNameFormat=cn=%s,ou=&lt;/SPAN&gt;&lt;EM&gt;people&lt;/EM&gt;&lt;SPAN&gt;,ou=&lt;/SPAN&gt;&lt;EM&gt;admin&lt;/EM&gt;&lt;SPAN&gt;,dc=&lt;/SPAN&gt;&lt;EM&gt;company&lt;/EM&gt;&lt;SPAN&gt;,dc=&lt;/SPAN&gt;&lt;EM&gt;com&lt;/EM&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.security.principal=&lt;/SPAN&gt;&lt;EM&gt;userID that can be used to connect to AD &lt;/EM&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.security.credentials=&lt;/SPAN&gt;&lt;EM&gt;password for principal userID to connect with&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Hope that helps. It was how I configured it.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Apr 2009 20:27:29 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205033#M158163</guid>
      <dc:creator>rliu</dc:creator>
      <dc:date>2009-04-03T20:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205034#M158164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;ldap.authentication.userNameFormat=cn=%s,ou=people,ou=admin,dc=company,dc=com&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;SPAN&gt;And what if users are in many OU ?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Examples:&lt;/SPAN&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;cn=%s,ou=people,ou=admin,dc=company,dc=com&lt;BR /&gt;cn=%s,ou=people1,ou=admin,dc=company,dc=com&lt;BR /&gt;cn=%s,ou=people2,ou=admin,dc=company,dc=com&lt;BR /&gt;cn=%s,ou=people3,ou=admin,dc=company,dc=com&lt;BR /&gt;…&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;thanks for your reply &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://connect.hyland.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Apr 2009 16:09:16 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205034#M158164</guid>
      <dc:creator>francois12</dc:creator>
      <dc:date>2009-04-07T16:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205035#M158165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;My suggestion (and purely a guess as I have not encountered such a situation) is to try appending the other OUs to your line like this: &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;cn=%s,ou=people,ou=people1,ou=people2,ou=people3,ou=admin,dc=company,dc=com&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;Worth a shot.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Apr 2009 16:40:34 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205035#M158165</guid>
      <dc:creator>rliu</dc:creator>
      <dc:date>2009-04-07T16:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205036#M158166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;huu.. unfortunately that's not working either&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;but thanks for your reply!&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2009 08:19:16 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205036#M158166</guid>
      <dc:creator>francois12</dc:creator>
      <dc:date>2009-04-08T08:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205037#M158167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;try this.&amp;nbsp; it works for me.&amp;nbsp; I am running Win 2K3 R2 for Active directory and Alfresco labs 3.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Let me know if you want a working Sync file&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;watch capitalization on your DNs they have bit me before&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;#&lt;BR /&gt;# This properties file brings together the common options for LDAP authentication rather than editing the bean definitions&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;# How to map the user id entered by the user to taht passed through to LDAP&lt;BR /&gt;# - simple &lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp; - this must be a DN and would be something like&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CN=%s,DC=company,DC=com&lt;BR /&gt;# - digest&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp; - usually pass through what is entered&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; %s&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;ldap.authentication.userNameFormat=%s&lt;BR /&gt;&lt;BR /&gt;# The LDAP context factory to use&lt;BR /&gt;ldap.authentication.java.naming.factory.initial=com.sun.jndi.ldap.LdapCtxFactory&lt;BR /&gt;&lt;BR /&gt;# The URL to connect to the LDAP server &lt;BR /&gt;ldap.authentication.java.naming.provider.url=ldap://server:389&lt;BR /&gt;&lt;BR /&gt;# The authentication mechanism to use&lt;BR /&gt;ldap.authentication.java.naming.security.authentication=SIMPLE&lt;BR /&gt;&lt;BR /&gt;# The default principal to use (only used for LDAP sync)&lt;BR /&gt;ldap.authentication.java.naming.security.principal=cn=reader,ou=service,ou=admin,dc=COMPANY,dc=com&lt;BR /&gt;&lt;BR /&gt;# The password for the default principal (only used for LDAP sync)&lt;BR /&gt;ldap.authentication.java.naming.security.credentials=Password for above user&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user at bind time&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas&lt;BR /&gt;ldap.authentication.escapeCommasInBind=false&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user when setting the authenticated user&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas, and the escaped \, is &lt;BR /&gt;# pulled in as part of an LDAP sync&lt;BR /&gt;# If this option is set to true it will break the default home folder provider as space names can not contain \&lt;BR /&gt;ldap.authentication.escapeCommasInUid=false&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Apr 2009 20:45:03 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205037#M158167</guid>
      <dc:creator>ofrxnz</dc:creator>
      <dc:date>2009-04-08T20:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205038#M158168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;try this.&amp;nbsp; it works for me.&amp;nbsp; I am running Win 2K3 R2 for Active directory and Alfresco labs 3.0&lt;BR /&gt;&lt;BR /&gt;Let me know if you want a working Sync file&lt;BR /&gt;&lt;BR /&gt;watch capitalization on your DNs they have bit me before&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;#&lt;BR /&gt;# This properties file brings together the common options for LDAP authentication rather than editing the bean definitions&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;# How to map the user id entered by the user to taht passed through to LDAP&lt;BR /&gt;# - simple &lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp; - this must be a DN and would be something like&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CN=%s,DC=company,DC=com&lt;BR /&gt;# - digest&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp; - usually pass through what is entered&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; %s&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;ldap.authentication.userNameFormat=%s&lt;BR /&gt;&lt;BR /&gt;# The LDAP context factory to use&lt;BR /&gt;ldap.authentication.java.naming.factory.initial=com.sun.jndi.ldap.LdapCtxFactory&lt;BR /&gt;&lt;BR /&gt;# The URL to connect to the LDAP server &lt;BR /&gt;ldap.authentication.java.naming.provider.url=ldap://server:389&lt;BR /&gt;&lt;BR /&gt;# The authentication mechanism to use&lt;BR /&gt;ldap.authentication.java.naming.security.authentication=SIMPLE&lt;BR /&gt;&lt;BR /&gt;# The default principal to use (only used for LDAP sync)&lt;BR /&gt;ldap.authentication.java.naming.security.principal=cn=reader,ou=service,ou=admin,dc=COMPANY,dc=com&lt;BR /&gt;&lt;BR /&gt;# The password for the default principal (only used for LDAP sync)&lt;BR /&gt;ldap.authentication.java.naming.security.credentials=Password for above user&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user at bind time&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas&lt;BR /&gt;ldap.authentication.escapeCommasInBind=false&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user when setting the authenticated user&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas, and the escaped \, is &lt;BR /&gt;# pulled in as part of an LDAP sync&lt;BR /&gt;# If this option is set to true it will break the default home folder provider as space names can not contain \&lt;BR /&gt;ldap.authentication.escapeCommasInUid=false&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;&lt;SPAN&gt;I don't understand how Alfresco search and bind the user without setting its full DN&amp;nbsp; in "ldap.authentication.userNameFormat".&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Do you set this DN in the sync file? Yes I would like to check your file to understand.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks for your help!&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Apr 2009 09:59:31 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205038#M158168</guid>
      <dc:creator>francois12</dc:creator>
      <dc:date>2009-04-09T09:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205039#M158169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;I don't understand how Alfresco search and bind the user without setting its full DN in "ldap.authentication.userNameFormat".&lt;BR /&gt;Do you set this DN in the sync file? Yes I would like to check your file to understand.&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;&lt;SPAN&gt;First, the Sync file is not needed for authentication.&amp;nbsp; it is only needed to populate phone numbers, locations, etc from active directory without manual entry….Ill still post it when i get to work in a couple hours.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;also, did that config work for you?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;on to the explanation (or how i think it works)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Active Directory is already a fully functional LDAP server.&amp;nbsp; It is just not exactly Standards compliant.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Once, the user you define in "ldap.authentication.java.naming.security.principal in&amp;nbsp; ldap-authentication-context.xml binds to AD you can search for %s in every portion of Active Directory as you would search Google for dirt on your boss.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;so if we have a user with the first name of "Jane" a last name of "Doe" and a username "Jane.Doe" and she is located in the Company&amp;gt;Domain Users folder and in that folder they show up as "Jane Doe".&amp;nbsp; When you click on "Jane Doe" you can see some of their attributes (there are also many hidden attributes you can only see with an LDAP browser such as Apache Directory Studio")&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;then we successfully bind with the "ldap.authentication.java.naming.security.principal" user and&amp;nbsp; someone entered "Jane.Doe" as their user name &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Alfresco will tell AD to search through everything in Active Directory for any attribute that ="Jane.Doe"&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;so it could be sAMAccountName=Jane.Doe or SomeOtherAttribute=JaneDoe, or well anything =Jane.Doe&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Once Active Directory has found some attribute that = "Jane.Doe" it will return&amp;nbsp; the full DN where it found "Jane.Doe".&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;so in the above case, Alfresco says search for *="Jane.Doe" then AD will tell Alfresco I found "Jane.Doe" in "cn=Jane Doe,ou=Domain Users,dc=COMPANY,dc=com".&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Alfresco then uses this returned DN to test the password.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Apr 2009 11:49:33 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205039#M158169</guid>
      <dc:creator>ofrxnz</dc:creator>
      <dc:date>2009-04-09T11:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205040#M158170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;I tried to dump the ldap network packets and I discover that there is no "search and bind" :&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Alfresco just binds. It buils a DN from the given login and tries to connect with the given password.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;How can I activate the ldap search&amp;nbsp; ?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks a lot for your help &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://connect.hyland.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Apr 2009 13:54:54 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205040#M158170</guid>
      <dc:creator>francois12</dc:creator>
      <dc:date>2009-04-09T13:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205041#M158171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Personally, I find LDAP a bit of a pain, so i switched over to NTLM.&amp;nbsp; Its just easier but doesn't import any user data (email, phone, etc) nore does it import AD groups.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://wiki.alfresco.com/wiki/3.0_Configuring_NTLM" rel="nofollow noopener noreferrer"&gt;http://wiki.alfresco.com/wiki/3.0_Configuring_NTLM&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;You ONLY need to do the bit &lt;/SPAN&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;AFTER&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt; this heading&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;"NTLM Passthru Authentication "&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt; the first part is for Single Sign on and that just adds unneeded complication at this point.&amp;nbsp; and SSO is broken in share so dont touch it.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;For LDAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If it is successfully binding, it should automatically search with the config i posted earlier.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;How did you get your Bind user DN&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I used this application&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://directory.apache.org/studio/" rel="nofollow noopener noreferrer"&gt;http://directory.apache.org/studio/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;the settings for a connection should be &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;(Network tab)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hostname = serverIP or DNS anme&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port = 389&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;encryption method = no encryption&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;(Authentication tab)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;bind dn or user = administrator&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;bind password = **********&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I am using administrator because its a bit of a pain to figure out what username they want out of the box.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;in my case it is the name the user shows up as in the left column of AD.&amp;nbsp; so in a jane.doe case, the username for Apache directory studio needs to be "Jane Doe"&amp;nbsp; because that is the "Real" uid&amp;nbsp; (have i mentioned AD is not standards compliant)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Once you successfully connect navigate around in your tree and find your bind user.&amp;nbsp; Once selected, the full DN will be at the top of the center frame.&amp;nbsp;&amp;nbsp; and all you need to do is copy and paste it.&amp;nbsp; It can be CaSE SenSItiVe so be careful copying it &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Here is the sync file i said i would post.&amp;nbsp; Its a bit of a pain to use because it can render share non functional.&amp;nbsp; Basically it will delete any group that is not in ad if this is set to true "ldap.synchronisation.import.group.clearAllChildren" and if it is set to false it will only add users to groups and never delete them.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;My advise is do not enable Sync until you are comfortable your authentication is working well.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&lt;BR /&gt;#&lt;BR /&gt;# This properties file is used to configure LDAP syncronisation&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;# The query to find the people to import&lt;BR /&gt;ldap.synchronisation.personQuery=(objectclass=user)&lt;BR /&gt;&lt;BR /&gt;# The search base of the query to find people to import&lt;BR /&gt;ldap.synchronisation.personSearchBase=OU=Domain Users,DC=COMPANY,DC=com&lt;BR /&gt;&lt;BR /&gt;# The attribute name on people objects found in LDAP to use as the uid in Alfresco&lt;BR /&gt;ldap.synchronisation.userIdAttributeName=sAMAccountName&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the first name property in Alfresco&lt;BR /&gt;ldap.synchronisation.userFirstNameAttributeName=givenName&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the last name property in Alfresco&lt;BR /&gt;ldap.synchronisation.userLastNameAttributeName=sn&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the email property in Alfresco&lt;BR /&gt;ldap.synchronisation.userEmailAttributeName=mail&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the organizational id&amp;nbsp; property in Alfresco&lt;BR /&gt;ldap.synchronisation.userOrganizationalIdAttributeName=company&lt;BR /&gt;&lt;BR /&gt;# The default home folder provider to use for people created via LDAP import&lt;BR /&gt;ldap.synchronisation.defaultHomeFolderProvider=userHomesHomeFolderProvider&lt;BR /&gt;&lt;BR /&gt;#personalHomeFolderProvider&lt;BR /&gt;&lt;BR /&gt;# The query to find group objects&lt;BR /&gt;ldap.synchronisation.groupQuery=(objectclass=groupOfNames)&lt;BR /&gt;&lt;BR /&gt;# The search base to use to find group objects&lt;BR /&gt;ldap.synchronisation.groupSearchBase=dc=company,dc=com&lt;BR /&gt;&lt;BR /&gt;# The attribute on LDAP group objects to map to the gid property in Alfrecso&lt;BR /&gt;ldap.synchronisation.groupIdAttributeName=cn&lt;BR /&gt;&lt;BR /&gt;# The group type in LDAP&lt;BR /&gt;ldap.synchronisation.groupType=groupOfNames&lt;BR /&gt;&lt;BR /&gt;# The person type in LDAP&lt;BR /&gt;ldap.synchronisation.personType=inetOrgPerson&lt;BR /&gt;&lt;BR /&gt;# The attribute in LDAP on group objects that defines the DN for its members&lt;BR /&gt;ldap.synchronisation.groupMemberAttributeName=member&lt;BR /&gt;&lt;BR /&gt;# The cron expression defining when people imports should take place&lt;BR /&gt;ldap.synchronisation.import.person.cron=14 45 * * * ?&lt;BR /&gt;&lt;BR /&gt;# The cron expression defining when group imports should take place&lt;BR /&gt;ldap.synchronisation.import.group.cron=0 30 * * * ?&lt;BR /&gt;&lt;BR /&gt;# Should all groups be cleared out at import time?&lt;BR /&gt;# - this is safe as groups are not used in Alfresco for other things (unlike person objects which you should never clear out during an import)&lt;BR /&gt;# - setting this to true means old group definitions will be tidied up.&lt;BR /&gt;ldap.synchronisation.import.group.clearAllChildren=false&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Apr 2009 14:27:27 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205041#M158171</guid>
      <dc:creator>ofrxnz</dc:creator>
      <dc:date>2009-04-09T14:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205042#M158172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;hi ofrxnz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I appreciate your help, thank you!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The thing is.. I came to the conclusion that Alfresco is a the moment not able to search and bind in many LDAP nodes. Sorry to contradict your saying.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Alfresco is only able to build a DN with the username we gave it and tries to connect with the password.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;If you or someone knows how to patch Alfresco to add the search&amp;amp;bind feature.. let me know!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Moreover, I'd like to know if NTLM authentification needs LDAP to work or if it is another authentification method aside from LDAP(AD).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I'd also like to know if the clients needs to be on Windows, in the domain. We have users that are using Linux not binded to the domain.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks again for you help&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2009 08:22:06 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205042#M158172</guid>
      <dc:creator>francois12</dc:creator>
      <dc:date>2009-04-28T08:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205043#M158173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Sorry its not working for you&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Alfresco will only search/recurse under the folder defined by this line&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronisation.personSearchBase=OU=Domain Users,DC=COMPANY,DC=com&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;you may want to set it to &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronisation.personSearchBase=DC=COMPANY,DC=com&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;that way it should start at the bottom of your directory.&amp;nbsp; Mind you company and com should reflect your AD domain.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;LDAP against AD is kind of weird at times, but its always worked out of the box for me.&amp;nbsp; It may be an AD issue….I know in 2008 they closed down a bunch of stuff.&amp;nbsp; I also hate the windows firewall.&amp;nbsp; There is also a port in the 3000s i have had to use with AD/LDAP at times for other applications (apache). I don't remember the port number off the top of my head.&amp;nbsp; I believe it was "forest view" or something like that&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I abandoned AD/LDAP because it kept locking out the bind user. We force a 3 strike rule.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;For NTLM you &lt;/SPAN&gt;&lt;SPAN style="text-decoration: underline;"&gt;do not &lt;/SPAN&gt;&lt;SPAN&gt;need LDAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;NTLM is a completely independent protocol.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If i remember correctly NTLM was the main Windows Authentication protocol between NT4 and ME/2000.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;With NTLM, the web interface (alfresco explorer, webdav, share) will prompt for a password when using NTLM.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If you opt for NTLM with Single Sign On (SSO) it will probably only SSO with windows clients joined to the domain.&amp;nbsp; For all others it will prompt for credentials.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;we have had no issues with non-domained windows boxes or non-domained OS X (personal) machines.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We have had issues with Vista and SSO (not NTLM) but if you use the web logon, not the SSO it is fine.&amp;nbsp; The other issue is we have had is we had a&amp;nbsp; user who windows box was joined to another domain and they had the same username on our network.&amp;nbsp; In this case, it saw they were a valid username and didn't check domain.&amp;nbsp; This case was really strange though and never repeated its self&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;you would need to experimental with the file servers but i expect them to have similar behavior.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The only requirement is that the user is a valid AD user.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I have had no issues with a win 2k3R2 AD server.&amp;nbsp; 2008 on the other hand seemed to pose more headaches when i beta tested it.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Apr 2009 11:51:18 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205043#M158173</guid>
      <dc:creator>ofrxnz</dc:creator>
      <dc:date>2009-04-28T11:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205044#M158174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;So how do you know if Alfresco is using LDAP for authentication?&amp;nbsp; I have set my ldap-authentication.properties file as per this thread, however after restarting alfresco I can still login with the "admin" account but not my domain account.&amp;nbsp; It was my understanding that if LDAP authentication was enabled the system based internal accounts wouldn't work anymore.&amp;nbsp; Is there a way to know what's going on?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;For that matter, how do you physicall add a domain user to the system when it asks for username and password?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;JR&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 May 2009 02:21:04 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205044#M158174</guid>
      <dc:creator>jriker1</dc:creator>
      <dc:date>2009-05-06T02:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205045#M158175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;try another account in LDAP.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If the authentication comes back valid, Alfresco will create a local user profile&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;LDAP typically just takes over (unless chaining is setup).&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Every ldap config is surprisingly custom to the environment.&amp;nbsp; Everyone does something slightly different to their LDAP/AD server.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If its not working make sure you renamed the config file.&amp;nbsp; At the very least it usually locks everyone out.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;In alfresco 3 the users "admin" and "administrator" are admins by default no matter what the repo source is.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;On the other hand, im probably not as up on LDAP in the most recent iteration of Labs 3.&amp;nbsp; I switched to NTLM based Auth in version 3b they are at 3d now&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 May 2009 02:31:48 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205045#M158175</guid>
      <dc:creator>ofrxnz</dc:creator>
      <dc:date>2009-05-06T02:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205046#M158176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Thanks for the reply&amp;nbsp; ofrxnz.&amp;nbsp; May just be me but something just doesn't sound right.&amp;nbsp; The properties page was active by default (i.e. not .sample at the end), and had dummy config data in it.&amp;nbsp; Wouldn't think it would be reading that in and dying everytime to connect.&amp;nbsp; Would think there is some bean or something that has to be changed to enable this.&amp;nbsp; At a minimum perhaps a log or something of what is happening.&amp;nbsp; Hard for me to understand how the system knows the difference between internal username/password users and domain users when logging in.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;JR&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 May 2009 18:56:19 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205046#M158176</guid>
      <dc:creator>jriker1</dc:creator>
      <dc:date>2009-05-06T18:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205047#M158177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;ldap-authentication-context.xml.sample is the file that needs to be renamed (remove the .sample).&amp;nbsp; don't edit this file.&amp;nbsp; it reads its values over from the .properties file&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I think this is where all the bean stuff is.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;you can probably tweak the log4j configuration file and enable more levels of logging.&amp;nbsp; I dont know what is there for ldap.&amp;nbsp; have only touched the log config file once.&amp;nbsp;&amp;nbsp; (somewhere in the deployed war file)(i think thats the correct name)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;for the last one.&amp;nbsp; Im no expert on this, but from my understanding……&amp;nbsp; the short answer is….there really isnt a difference between internal users and external users.&amp;nbsp; only where to look for a password. &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;There are to halves to a person in alfresco.&amp;nbsp; one half is for the internal authentication mechanism and if i remember is more system oriented and the other is more of a repo by repo "profile" if you will.&amp;nbsp; when using external authentication, the "profile" stays and the internal mechanism is superseded&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;when a user logs into alfresco for the first time using an ldap directory, alfresco receives the "Valid Account" information from the repo.&amp;nbsp;&amp;nbsp; It then trys to associate the account with a "profile".&amp;nbsp; If it cant find one it creates a blank profile with only a username.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I am guessing there is an order of precedence in the authentication engine.&amp;nbsp; if bean A out ranks bean B the latter ie effectively disabled.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;It is more complicated than this but hats the high level of how i understand it.&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;you can set up chaining so say….NTLM fails, it will try LDAP.&amp;nbsp; if LDAP fails it will try Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Adam&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 May 2009 19:28:37 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205047#M158177</guid>
      <dc:creator>ofrxnz</dc:creator>
      <dc:date>2009-05-06T19:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205048#M158178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Thanks for the reply.&amp;nbsp; The ldap-authentication-context.xml is already set without the .sample.&amp;nbsp; Same with the ldap-authentication.properties.&amp;nbsp; I know I have this properties page setup right.&amp;nbsp; Not sure if I need to do something elsewhere but guess I'll keep looking.&amp;nbsp; Just get an exception that authentication failed with an existing user I added before that exists on the domain with the same network id.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;JR&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 May 2009 21:12:47 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205048#M158178</guid>
      <dc:creator>jriker1</dc:creator>
      <dc:date>2009-05-07T21:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205049#M158179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hi, I have LDAP (AD), NTLM and sync working propertly but I have a handicap. In my syncronization I import the users and groups of an especific OU. When I try to logon with a user member of this specific OU I can logon succesfully, otherwise, when I try to logon with a users not in that OU I also can logon!!. I don't want to allow logon for the users out of this OU, only for the users imported or for the users in the OU specified in the sample file. &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Do you know wich is the problem?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jun 2009 11:20:25 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205049#M158179</guid>
      <dc:creator>rchamy</dc:creator>
      <dc:date>2009-06-19T11:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205050#M158180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Try setting the autoCreatePeopleOnLogin property on the authenticationComponentBase bean to false. In theory that won't allow in anyone that hasn't been created by the LDAP sync.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We'll look into making this easier to configure in the v3.2 release.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jun 2009 11:38:31 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205050#M158180</guid>
      <dc:creator>dward</dc:creator>
      <dc:date>2009-06-19T11:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory authentification</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205051#M158181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Thanks for the quickly reply. I'm looking for that bean in the ldap-authentication-context.xml and its look like:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;bean id="authenticationComponent"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class="org.alfresco.repo.security.authentication.ldap.LDAPAuthenticationComponentImpl" &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parent="authenticationComponentBase"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;property name="LDAPInitialDirContextFactory"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;ref bean="ldapInitialDirContextFactory"/&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;property name="userNameFormat"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;!–&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This maps between what the user types in and what is passed through to the underlying LDAP authentication.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "%s" - the user id is passed through without modification.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Used for LDAP authentication such as DIGEST-MD5, anything that is not "simple".&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cn=%s,ou=London,dc=company,dc=com" - If the user types in "Joe Bloggs" the authenticate as "cn=Joe Bloggs,ou=London,dc=company,dc=com" &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Usually for simple authentication. Simple authentication always uses the DN for the user.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; –&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;value&amp;gt;${ldap.authentication.userNameFormat}&amp;lt;/value&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;property name="nodeService"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;ref bean="nodeService" /&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;property name="personService"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;ref bean="personService" /&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;property name="transactionService"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;ref bean="transactionService" /&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/property&amp;gt;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;property name="escapeCommasInBind"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;value&amp;gt;${ldap.authentication.escapeCommasInBind}&amp;lt;/value&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;property name="escapeCommasInUid"&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;value&amp;gt;${ldap.authentication.escapeCommasInUid}&amp;lt;/value&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/property&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/bean&amp;gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;Can you specify tha correcto code for me? Thank you very much.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jun 2009 11:46:31 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/active-directory-authentification/m-p/205051#M158181</guid>
      <dc:creator>rchamy</dc:creator>
      <dc:date>2009-06-19T11:46:31Z</dc:date>
    </item>
  </channel>
</rss>

