<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP authentication to Lion Server Open Directory in Alfresco Archive</title>
    <link>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267678#M220808</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Environment: Alfresco 4.0d using the mac installer on a Lion Server (10.7.3), using the built-in Postgresql server to host the database.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The ldap setup is a little different for Apple's version of OpenLDAP. I'm posting my config file here in case it saves anyone time.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;1. you need to setup chaining in /Applications/alfresco-4.0.d/tomcat/shared/classes/alfresco-global.properties&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;### Authentication Chain ###&lt;BR /&gt;authentication.chain=alfrescoNtlm1:alfrescoNtlm,ldap1:ldap&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;I also turned on debugging to see how ldap was working&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;### Debug lines ###&lt;BR /&gt;log4.logger.org.alfresco.repo.security.authentication.ldap=debug &lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;2. Modify /Applications/alfresco-4.0.d/tomcat/webapps/alfresco/WEB-INF/classes/alfresco/subsystems/Authentication/ldap/ldap-authentication.properties so it looks like:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;# This flag enables use of this LDAP subsystem for authentication. It may be&lt;BR /&gt;# that this subsytem should only be used for synchronization, in which case&lt;BR /&gt;# this flag should be set to false.&lt;BR /&gt;ldap.authentication.active=true&lt;BR /&gt;&lt;BR /&gt;#&lt;BR /&gt;# This properties file brings together the common options for LDAP authentication rather than editing the bean definitions&lt;BR /&gt;#&lt;BR /&gt;ldap.authentication.allowGuestLogin=true&lt;BR /&gt;# How to map the user id entered by the user to that passed through to LDAP&lt;BR /&gt;# - simple &lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp; - this must be a DN and would be something like&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uid=%s,ou=People,dc=company,dc=com&lt;BR /&gt;# - digest&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp; - usually pass through what is entered&lt;BR /&gt;#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; %s&lt;BR /&gt;# If not set, an LDAP query involving ldap.synchronization.personQuery and ldap.synchronization.userIdAttributeName will &lt;BR /&gt;# be performed to resolve the DN dynamically. This allows directories to be structured and doesn't require the user ID to&lt;BR /&gt;# appear in the DN.&lt;BR /&gt;ldap.authentication.userNameFormat=uid=%s,cn=users,dc=domain,dc=com&lt;BR /&gt;#ldap.authentication.userNameFormat=%s&lt;BR /&gt;&lt;BR /&gt;# The LDAP context factory to use&lt;BR /&gt;ldap.authentication.java.naming.factory.initial=com.sun.jndi.ldap.LdapCtxFactory&lt;BR /&gt;&lt;BR /&gt;# The URL to connect to the LDAP server &lt;BR /&gt;ldap.authentication.java.naming.provider.url=ldap://&amp;lt;myldapserver&amp;gt;:389&lt;BR /&gt;&lt;BR /&gt;# The authentication mechanism to use for password validation&lt;BR /&gt;ldap.authentication.java.naming.security.authentication=simple&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user at bind time&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas&lt;BR /&gt;ldap.authentication.escapeCommasInBind=false&lt;BR /&gt;&lt;BR /&gt;# Escape commas entered by the user when setting the authenticated user&lt;BR /&gt;# Useful when using simple authentication and the CN is part of the DN and contains commas, and the escaped \, is &lt;BR /&gt;# pulled in as part of an LDAP sync&lt;BR /&gt;# If this option is set to true it will break the default home folder provider as space names can not contain \&lt;BR /&gt;ldap.authentication.escapeCommasInUid=false&lt;BR /&gt;&lt;BR /&gt;# Comma separated list of user names who should be considered administrators by default&lt;BR /&gt;ldap.authentication.defaultAdministratorUserNames=localadmin,admin&lt;BR /&gt;&lt;BR /&gt;# This flag enables use of this LDAP subsystem for user and group&lt;BR /&gt;# synchronization. It may be that this subsytem should only be used for &lt;BR /&gt;# authentication, in which case this flag should be set to false.&lt;BR /&gt;ldap.synchronization.active=false&lt;BR /&gt;&lt;BR /&gt;# The authentication mechanism to use for synchronization&lt;BR /&gt;ldap.synchronization.java.naming.security.authentication=none&lt;BR /&gt;&lt;BR /&gt;# The default principal to use (only used for LDAP sync)&lt;BR /&gt;ldap.synchronization.java.naming.security.principal=&lt;BR /&gt;&lt;BR /&gt;# The password for the default principal (only used for LDAP sync)&lt;BR /&gt;ldap.synchronization.java.naming.security.credentials=&lt;BR /&gt;&lt;BR /&gt;# If positive, this property indicates that RFC 2696 paged results should be&lt;BR /&gt;# used to split query results into batches of the specified size. This&lt;BR /&gt;# overcomes any size limits imposed by the LDAP server.&lt;BR /&gt;ldap.synchronization.queryBatchSize=0&lt;BR /&gt;&lt;BR /&gt;# If positive, this property indicates that range retrieval should be used to fetch&lt;BR /&gt;# multi-valued attributes (such as member) in batches of the specified size.&lt;BR /&gt;# Overcomes any size limits imposed by Active Directory.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;ldap.synchronization.attributeBatchSize=0&lt;BR /&gt;&lt;BR /&gt;# The query to select all objects that represent the groups to import.&lt;BR /&gt;ldap.synchronization.groupQuery=(objectclass\=groupOfNames)&lt;BR /&gt;&lt;BR /&gt;# The query to select objects that represent the groups to import that have changed since a certain time.&lt;BR /&gt;ldap.synchronization.groupDifferentialQuery=(&amp;amp;(objectclass\=groupOfNames)(!(modifyTimestamp&amp;lt;\={0})))&lt;BR /&gt;&lt;BR /&gt;# The query to select all objects that represent the users to import.&lt;BR /&gt;ldap.synchronization.personQuery=(objectclass\=inetOrgPerson)&lt;BR /&gt;&lt;BR /&gt;# The query to select objects that represent the users to import that have changed since a certain time.&lt;BR /&gt;ldap.synchronization.personDifferentialQuery=(&amp;amp;(objectclass\=inetOrgPerson)(!(modifyTimestamp&amp;lt;\={0})))&lt;BR /&gt;&lt;BR /&gt;# The group search base restricts the LDAP group query to a sub section of tree on the LDAP server.&lt;BR /&gt;ldap.synchronization.groupSearchBase=cn\=groups,dc\=domain,dc\=com&lt;BR /&gt;&lt;BR /&gt;# The user search base restricts the LDAP user query to a sub section of tree on the LDAP server.&lt;BR /&gt;ldap.synchronization.userSearchBase=cn\=users,dc\=domain,dc\=com&lt;BR /&gt;&lt;BR /&gt;# The name of the operational attribute recording the last update time for a group or user.&lt;BR /&gt;ldap.synchronization.modifyTimestampAttributeName=modifyTimestamp&lt;BR /&gt;&lt;BR /&gt;# The timestamp format. Unfortunately, this varies between directory servers.&lt;BR /&gt;ldap.synchronization.timestampFormat=yyyyMMddHHmmss'Z'&lt;BR /&gt;&lt;BR /&gt;# The attribute name on people objects found in LDAP to use as the uid in Alfresco&lt;BR /&gt;ldap.synchronization.userIdAttributeName=uid&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the first name property in Alfresco&lt;BR /&gt;ldap.synchronization.userFirstNameAttributeName=givenName&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the last name property in Alfresco&lt;BR /&gt;ldap.synchronization.userLastNameAttributeName=sn&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the email property in Alfresco&lt;BR /&gt;ldap.synchronization.userEmailAttributeName=mail&lt;BR /&gt;&lt;BR /&gt;# The attribute on person objects in LDAP to map to the organizational id&amp;nbsp; property in Alfresco&lt;BR /&gt;ldap.synchronization.userOrganizationalIdAttributeName=o&lt;BR /&gt;&lt;BR /&gt;# The default home folder provider to use for people created via LDAP import&lt;BR /&gt;ldap.synchronization.defaultHomeFolderProvider=largeHomeFolderProvider&lt;BR /&gt;&lt;BR /&gt;# The attribute on LDAP group objects to map to the authority name property in Alfresco&lt;BR /&gt;ldap.synchronization.groupIdAttributeName=cn&lt;BR /&gt;&lt;BR /&gt;# The attribute on LDAP group objects to map to the authority display name property in Alfresco&lt;BR /&gt;ldap.synchronization.groupDisplayNameAttributeName=apple-group-realname&lt;BR /&gt;&lt;BR /&gt;# The group type in LDAP&lt;BR /&gt;ldap.synchronization.groupType=groupOfNames&lt;BR /&gt;&lt;BR /&gt;# The person type in LDAP&lt;BR /&gt;ldap.synchronization.personType=users&lt;BR /&gt;&lt;BR /&gt;# The attribute in LDAP on group objects that defines the DN for its members&lt;BR /&gt;ldap.synchronization.groupMemberAttributeName=memberUid&lt;BR /&gt;&lt;BR /&gt;# If true progress estimation is enabled. When enabled, the user query has to be run twice in order to count entries.&lt;BR /&gt;ldap.synchronization.enableProgressEstimation=true&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;Note: I'm not currently synchronising, that's for later.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Hope this helps.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 May 2012 17:28:12 GMT</pubDate>
    <dc:creator>peterglock</dc:creator>
    <dc:date>2012-05-04T17:28:12Z</dc:date>
    <item>
      <title>LDAP authentication to Lion Server Open Directory</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267678#M220808</link>
      <description>Environment: Alfresco 4.0d using the mac installer on a Lion Server (10.7.3), using the built-in Postgresql server to host the database.The ldap setup is a little different for Apple's version of OpenLDAP. I'm posting my config file here in case it saves anyone time.1. you need to setup chaining in</description>
      <pubDate>Fri, 04 May 2012 17:28:12 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267678#M220808</guid>
      <dc:creator>peterglock</dc:creator>
      <dc:date>2012-05-04T17:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication to Lion Server Open Directory</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267679#M220809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;i've been beating my head against my keyboard trying to get my Alfresco to LDAP authenticate against my OSX server.&amp;nbsp; its running mountain lion server, but shouldn't be too much different from your Lion server… but yet, i cannot get it to use the local OSX server for authentication…&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;i suspect i'm doing something wrong, as i'm not even getting any sort of debug logging for the authentication attempt.&amp;nbsp; everything you posted i did, other than changing the domain info to the appropriate settings for my server…&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;any ideas?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;-spike&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Aug 2012 06:46:06 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267679#M220809</guid>
      <dc:creator>spike</dc:creator>
      <dc:date>2012-08-18T06:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication to Lion Server Open Directory</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267680#M220810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;I have the same problem. I'm using the latest alfresco community 4.2b, tried it on 4.2a also. Probably I'm doing it all wrong.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2012 19:34:10 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267680#M220810</guid>
      <dc:creator>dagrafica</dc:creator>
      <dc:date>2012-10-28T19:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication to Lion Server Open Directory</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267681#M220811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;I have just set up a dev environment for mountain lion server so will test over the next week.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:07:03 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267681#M220811</guid>
      <dc:creator>peterglock</dc:creator>
      <dc:date>2012-11-02T18:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication to Lion Server Open Directory</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267682#M220812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;OK, I tried copying my configuration from Alfresco 4.0d over to 4.2 but can't get it to authenticate. Will continue to work on this and report back.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 12:03:29 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267682#M220812</guid>
      <dc:creator>peterglock</dc:creator>
      <dc:date>2012-11-11T12:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication to Lion Server Open Directory</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267683#M220813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;For those following this thread, take a look at &lt;/SPAN&gt;&lt;A href="https://forums.alfresco.com/en/viewtopic.php?f=57&amp;amp;t=47076#p139654" rel="nofollow noopener noreferrer"&gt;https://forums.alfresco.com/en/viewtopic.php?f=57&amp;amp;t=47076#p139654&lt;/A&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2012 20:32:47 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/ldap-authentication-to-lion-server-open-directory/m-p/267683#M220813</guid>
      <dc:creator>peterglock</dc:creator>
      <dc:date>2012-11-12T20:32:47Z</dc:date>
    </item>
  </channel>
</rss>

