<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to prevent users without an existing profile from logging in in Alfresco Archive</title>
    <link>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302831#M255961</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;I have another issue now.&amp;nbsp; We only want users that have an active AD profile in on of the groups to be able to log into Alfresco. We have found that users can use &amp;lt;username&amp;gt;@&amp;lt;domain&amp;gt; to log into alfresco and as long as they enter in the correct password that can be authenticated by a domain controller in the Active Directory forest, they can successfully log into alfresco, even though they are not part of any AD group that is synching with Alfresco. For these users alfresco creates an new local account for them, but they can only see whatever is set to Everyone for access.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;How do I lock this down to only allow users that are in AD groups that are synched to alfresco? If they are authenticated by AD but not in a AD group that is synched to Alfresco I want to lock them out.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Below is the NTLM passthru and LDAP being used&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;blockcode&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;### NTLM Passthru ###&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication.chain=alfrescoNtlm1:alfrescoNtlm,passthru1&lt;img id="smileytongue" class="emoticon emoticon-smileytongue" src="https://connect.hyland.com/i/smilies/16x16_smiley-tongue.png" alt="Smiley Tongue" title="Smiley Tongue" /&gt;assthru,ldap-ad1:ldap-ad&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;passthru.authentication.useLocalServer=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;passthru.authentication.servers=XXXX.XX\\x.x.x.2,XXXX.XX\\x.x.x.3,YYY\\x.x.x.4,YYY\\x.x.x.5&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ntlm.authentication.sso.enabled=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;alfresco.authentication.allowGuestLogin=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ntlm.authentication.mapUnknownUserToGuest=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;passthru.authentication.authenticateCIFS=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;passthru.authentication.authenticateFTP=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;passthru.authentication.guestAccess=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;passthru.authentication.defaultAdministratorUserNames=*******&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;passthru.authentication.offlineCheckInterval=300&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;### LDAP-AD ###&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# LDAP Sync&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# This flag enables use of this LDAP subsystem for authentication. It may be&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# that this subsytem should only be used for synchronization, in which case&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# this flag should be set to false.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.active=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.security.authentication=simple&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# This flag enables use of this LDAP subsystem for user and group&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# synchronization. It may be that this subsytem should only be used for&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# authentication, in which case this flag should be set to false.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.active=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.userNameFormat=%s&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.allowGuestLogin=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.provider.url=ldap://x.x.x.2:3268&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;synchronization.import.cron=0 0/10 * ? * *&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The default principal to bind with (only used for LDAP sync). This should be a UPN or DN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.java.naming.security.principal=CN\=LDAPQuery,CN\=Users,DC\=xxxx,DC\=xx&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The password for the default principal (only used for LDAP sync)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.java.naming.security.credentials=9\@NnI\#cuDE\!6&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# If positive, this property indicates that RFC 2696 paged results should be&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# used to split query results into batches of the specified size. This&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# overcomes any size limits imposed by the LDAP server.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.queryBatchSize=1000&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The query to select all objects that represent the groups to import.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupQuery=(&amp;amp;(objectclass\=group)(memberOf=cn\=ERP_Alfresco,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx))&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The query to select objects that represent the groups to import that have changed since a certain time.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupDifferentialQuery=(&amp;amp;(objectclass\=group)(memberOf=cn\=ERP_Alfresco,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx))&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The query to select all objects that represent the users to import.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.personQuery=(&amp;amp;(objectclass\=user)(|(memberOf=cn\=Alfresco_ITI,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ITS,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_TAD,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_Lab_Managers,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_Lab_Supervisors,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_Lab_Techs,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ERP_Project_Admin,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ERP_Project_User,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ERP_Project_Collaborator,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_MSG,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx))(userAccountControl\:1.2.840.113556.1.4.803\:\=512))&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The query to select objects that represent the users to import that have changed since a certain time.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.personDifferentialQuery=(&amp;amp;(objectclass\=user)(|(memberOf=cn\=Alfresco_ITI,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ITS,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_TAD,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_Lab_Managers,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_Lab_Supervisors,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_Lab_Techs,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ERP_Project_Admin,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ERP_Project_User,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_ERP_Project_Collaborator,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx)(memberOf=cn\=Alfresco_MSG,ou\=Alfresco Groups,ou\=Security Groups,dc\=xxxx,dc\=xx))(userAccountControl\:1.2.840.113556.1.4.803\:\=512))&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The group search base restricts the LDAP group query to a sub section of tree on the LDAP server.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupSearchBase=dc\=xxxx,dc\=xx&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The user search base restricts the LDAP user query to a sub section of tree on the LDAP server.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userSearchBase=dc\=xxxx,dc\=xx&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The name of the operational attribute recording the last update time for a group or user.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.modifyTimestampAttributeName=modifyTimestamp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.modifyTimestampAttributeName=modifyTimestamp&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The timestamp format. Unfortunately, this varies between directory servers.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.timestampFormat=yyyyMMddHHmmss'.0Z'&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The attribute name on people objects found in LDAP to use as the uid in Alfresco&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userIdAttributeName=sAMAccountName&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The attribute on person objects in LDAP to map to the first name property in Alfresco&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userFirstNameAttributeName=givenName&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The attribute on person objects in LDAP to map to the last name property in Alfresco&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userLastNameAttributeName=sn&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The attribute on person objects in LDAP to map to the email property in Alfresco&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userEmailAttributeName=mail&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The default home folder provider to use for people created via LDAP import&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.defaultHomeFolderProvider=userHomesHomeFolderProvider&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The attribute on LDAP group objects to map to the gid property in Alfrecso&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupIdAttributeName=cn&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The group type in LDAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupType=group&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The person type in LDAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.personType=user&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# The attribute in LDAP on group objects that defines the DN for its members&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupMemberAttributeName=member&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.synchronizeChangesOnly=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;# enable user access auditing&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;audit.enabled=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;audit.alfresco-access.enables=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;/blockcode&amp;gt;&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 May 2014 21:22:59 GMT</pubDate>
    <dc:creator>hsturner</dc:creator>
    <dc:date>2014-05-23T21:22:59Z</dc:date>
    <item>
      <title>How to prevent users without an existing profile from logging in</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302831#M255961</link>
      <description>I have another issue now.&amp;nbsp; We only want users that have an active AD profile in on of the groups to be able to log into Alfresco. We have found that users can use &amp;lt;username&amp;gt;@&amp;lt;domain&amp;gt; to log into alfresco and as long as they enter in the correct password that can be authenticated by a dom</description>
      <pubDate>Fri, 23 May 2014 21:22:59 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302831#M255961</guid>
      <dc:creator>hsturner</dc:creator>
      <dc:date>2014-05-23T21:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent users without an existing profile from logging in</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302832#M255962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;You can change the file authentication-services-context.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Look for the line that has&lt;/SPAN&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&lt;BR /&gt;&amp;lt;property name="createMissingPeople"&amp;gt;&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;and set the value to "false"&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 May 2014 21:49:37 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302832#M255962</guid>
      <dc:creator>eswbitto</dc:creator>
      <dc:date>2014-05-23T21:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent users without an existing profile from logging in</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302833#M255963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Thanks for your help.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Where do I find&amp;nbsp; authentication-services-context.xml?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 May 2014 17:19:01 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302833#M255963</guid>
      <dc:creator>hsturner</dc:creator>
      <dc:date>2014-05-27T17:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent users without an existing profile from logging in</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302834#M255964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;It should be in your install here.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&lt;BR /&gt;/alfresco install/tomcat/webapps/alfresco/WEB-INF/classes/alfresco/authentication-services-context.xml&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 May 2014 16:09:16 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/how-to-prevent-users-without-an-existing-profile-from-logging-in/m-p/302834#M255964</guid>
      <dc:creator>eswbitto</dc:creator>
      <dc:date>2014-05-28T16:09:16Z</dc:date>
    </item>
  </channel>
</rss>

