<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSO and LDAP on Alfresco 5.0 b in Alfresco Archive</title>
    <link>https://connect.hyland.com/t5/alfresco-archive/sso-and-ldap-on-alfresco-5-0-b/m-p/312818#M265948</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hi All,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I have been trying to get Single Sign On to work using LDAP configuration with Alfresco 5.0 b to no avail.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; I added the following to the alfresco-global.properties:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;authentication.chain=alfinst:alfrescoNtlm,ldap1:ldap-ad&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ntlm.authentication.sso.enabled=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.allowGuestLogin=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.userNameFormat=%s@xxxxx.local&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.provider.url=ldap://xxxx.xxxx.local:389&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.defaultAdministratorUserNames=Administrator,alfresco_sa&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.java.naming.security.principal=alfresco_sa@xxxxx.local&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.java.naming.security.credentials=Alfresco123&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupSearchBase= OU=Security Groups,OU=xxx xxxx,DC=xxxxx,DC=local&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userSearchBase= OU=xxxx xxxx,DC=xxxxx,DC=local&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Any idea of where I am going wrong?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Marwan&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Nov 2014 09:51:59 GMT</pubDate>
    <dc:creator>marwan_khoueiry</dc:creator>
    <dc:date>2014-11-25T09:51:59Z</dc:date>
    <item>
      <title>SSO and LDAP on Alfresco 5.0 b</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/sso-and-ldap-on-alfresco-5-0-b/m-p/312818#M265948</link>
      <description>Hi All,I have been trying to get Single Sign On to work using LDAP configuration with Alfresco 5.0 b to no avail. I added the following to the alfresco-global.properties:authentication.chain=alfinst:alfrescoNtlm,ldap1:ldap-adntlm.authentication.sso.enabled=trueldap.authentication.allowGuestLogin=fal</description>
      <pubDate>Tue, 25 Nov 2014 09:51:59 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/sso-and-ldap-on-alfresco-5-0-b/m-p/312818#M265948</guid>
      <dc:creator>marwan_khoueiry</dc:creator>
      <dc:date>2014-11-25T09:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSO and LDAP on Alfresco 5.0 b</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/sso-and-ldap-on-alfresco-5-0-b/m-p/312819#M265949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I not pro in Alfresco but i will try give you some help.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Question 1:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- In C:\Alfresco\tomcat\webapps\alfresco\WEB-INF\classes\alfresco\subsystems\Authentication i have juste folder : alfrescoNtlm, external, kerberos and passthru&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- In authentication.chain you use alfinst:alfrescoNtlm,ldap1:ldap-ad&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;So why you use ldap1:ldap-ad&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;For information my file (it is not a reference i juste begining in alfresco) whith comment&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;##############################################&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;### SSO - LDAP authentication&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##&lt;/SPAN&gt;&lt;A href="http://docs.alfresco.com/4.0/concepts/auth-ldap-props.html" rel="nofollow noopener noreferrer"&gt;http://docs.alfresco.com/4.0/concepts/auth-ldap-props.html&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;##&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## This Boolean flag, when true enables use of this LDAP subsystem for authentication. It may be that this subsystem should only be used for user registry export, in which case this flag should be set to false and you would have to chain an additional subsystem such as passthru or kerberos to provide authentication functions.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.active=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The mechanism to use to authenticate with the LDAP server. Should be one of the standard values documented here or one of the values supported by the LDAP provider. Sun's LDAP provider supports the SASL mechanisms documented here. Recommended values are: &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#simple:&amp;nbsp; The basic LDAP authentication mechanism requiring the user name and password to be passed over the wire unencrypted. You may be able to add SSL for secure access, otherwise this should only be used for testing.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#DIGEST-MD5 : More secure RFC 2831 Digest Authentication. Note that with Active Directory, this requires your user accounts to be set up with reversible encryption, not the default setting.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.security.authentication=simple&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## Specifies how to map the user identifier entered by the user to that passed through to LDAP.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#If set to an empty string (the default for the ldap subsystem), an LDAP query involving ldap.synchronization.personQuery and ldap.synchronization.userIdAttributeName will be performed to resolve the DN from the user ID dynamically. This allows directories to be structured and does not require the user ID to appear in the DN.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#If set to a non-empty value, the substring %s in this value will be replaced with the entered user ID to produce the ID passed to LDAP. This restricts LDAP user names to a fixed format. The recommended format of this value depends on your LDAP server. &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.userNameFormat=%s@xxxx.priv&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## Identifies whether to allow unauthenticated users to log in to Alfresco as the 'guest' user.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.allowGuestLogin=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## The URL to connect to the LDAP server, containing its name and port. The standard ports for LDAP are 389 (and 636 for SSL). For example: ldap://openldap.domain.com:389&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.java.naming.provider.url=ldap://NDASI01.xxxx.priv:389&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##A comma separated list of user names to be considered administrators by default. If you are using LDAP for all your users, this maps an LDAP user to be an administrator user. This administrator user can then configure the other admin users or groups by add users and/or groups to the ALFRESCO_ADMINISTRATORS group using the Share Admin Console or Explorer Administration Console. &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.authentication.defaultAdministratorUserNames=AdminAlfresco&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;##############################################&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;### SSO - LDAP synchonization&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## This flag enables use of the LDAP subsystem for user registry export functions and decides whether the subsystem will contribute data to the synchronization subsystem. It may be that this subsystem should only be used for authentication, in which case this flag should be set to false.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.active=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## The LDAP user to connect as for the export operation, if one is required by the ldap.synchronization.java.naming.security.authentication authentication mechanism. This should be in the same format as ldap.authentication.userNameFormat but with a real user ID instead of %s.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#This is the default principal to use (only used for LDAP sync when ldap.synchronization.java.naming.security.authentication=simple): ldap.synchronization.java.naming.security.principal=cn\=Manager,dc\=company,dc\=com&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.java.naming.security.principal=AdminAlfresco@xxxx.priv&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The password for this user, if required. The password for the default principal (only used for LDAP sync when ldap.synchronization.java.naming.security.authentication=simple)&amp;nbsp; ldap.synchronization.java.naming.security.credentials=secret&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.java.naming.security.credentials=xxxxxxxxxxxxxx&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## If set to a positive integer, this property indicates that RFC 2696 paged results should be used to split query results into batches of the specified size. This overcomes any size limits imposed by the LDAP server. The default value of 1000 matches the default result limitation imposed by Active Directory. If set to zero or less, paged results will not be used.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.queryBatchSize=1000&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.attributeBatchSize=1000&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The query to select all objects that represent the groups to export. This query is used in full synchronization mode, which by default is scheduled every 24 hours.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupQuery=(&amp;amp;(objectclass\=group))&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The query to select objects that represent the groups to export that have changed since a certain time. Should use the placeholder {0} in place of a timestamp in the format specified by ldap.synchronization.timestampFormat. The timestamp substituted will be the maximum value of the attribute named by ldap.synchronization.modifyTimestampAttributeName the last time groups were queried. This query is used in differential synchronization mode, which by default is triggered whenever a user is successfully authenticated that does not yet exist in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupDifferentialQuery=(&amp;amp;(objectclass\=group)(!(modifyTimestamp&amp;lt;\={0})))&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## The query to select all objects that represent the users to export. This query is used in full synchronization mode, which by default is scheduled every 24 hours.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.personQuery=(&amp;amp;(objectclass\=user)(userAccountControl\:1.2.840.113556.1.4.803\:\=512))&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The query to select objects that represent the users to export that have changed since a certain time. Should use the placeholder {0} in place of a timestamp in the format specified by ldap.synchronization.timestampFormat. The timestamp substituted will be the maximum value of the attribute named by ldap.synchronization.modifyTimestampAttributeName the last time users were queried. This query is used in differential synchronization mode, which by default is triggered whenever a user is successfully authenticated that does not yet exist in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.personDifferentialQuery=(&amp;amp;(objectclass\=user)(userAccountControl\:1.2.840.113556.1.4.803\:\=512)(!(modifyTimestamp&amp;lt;\={0})))&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The DN below which to run the group queries.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupSearchBase=OU\=ALFRESCO-TEST,OU\=Migration,DC\=xxxx,DC\=priv&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The DN below which to run the user queries.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userSearchBase=OU\=ALFRESCO-TEST,OU\=Migration,DC\=xxxx,DC\=priv&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## The name of the operational attribute recording the last update time for a group or user.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.modifyTimestampAttributeName=modifyTimestamp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The timestamp format. This varies between directory servers. &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#Active Directory&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;yyyyMMddHHmmss'.0Z'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#OpenLDAP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yyyyMMddHHmmss'Z' &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.timestampFormat=yyyyMMddHHmmss'.0Z'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The attribute name on people objects found in LDAP to use as the uid in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userIdAttributeName=sAMAccountName&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The attribute on person objects in LDAP to map to the first name property in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userFirstNameAttributeName=givenName&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The attribute on person objects in LDAP to map to the last name property in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userLastNameAttributeName=sn&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The attribute on person objects in LDAP to map to the email property in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.userEmailAttributeName=mail&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The attribute on LDAP group objects to map to the group name in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupIdAttributeName=cn&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The group type in LDAP.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupType=group&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The person type in LDAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.personType=user&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##The attribute in LDAP on group objects that defines the DN for its members.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ldap.synchronization.groupMemberAttributeName=member&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## The attribute on person objects in LDAP to map to the organizational ID property in Alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#ldap.synchronization.userOrganizationalIdAttributeName=&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;##############################################&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;### SSO - LDAP synchonization configuration properties&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;## Specifies whether the scheduled synchronization job is run in differential mode. The default is true, which means that the scheduled sync job is run in differential mode (rather than full mode). Regardless of this setting a differential sync can still be triggered when a user who does not yet exist in Alfresco is successfully authenticated.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;synchronization.synchronizeChangesOnly=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##Specifies a cron expression defining when the scheduled synchronization job should run, by default at midnight every day.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#Le cron est paramétré pour une syncho toutes les heures&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;synchronization.import.cron=0 1 * * * ?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##Specifies whether to trigger a differential sync when a user is successfully authenticated who does not yet exist in Alfresco. The default is true.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;synchronization.syncWhenMissingPeopleLogIn=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;##Specifies whether to create a user with default properties when a user is successfully authenticated, who does not yet exist in Alfresco, and was not returned by a differential sync (if enabled with the property above). The default is true. Setting this to false allows you to restrict Alfresco to a subset of those users who could be authenticated by LDAP; only those created by synchronization are allowed to log in. You can control the set of users in this more restricted set by overriding the user query properties of the LDAP authentication subsystem.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;synchronization.autoCreatePeopleOnLogin=true&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2014 11:02:44 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/sso-and-ldap-on-alfresco-5-0-b/m-p/312819#M265949</guid>
      <dc:creator>mathieuga</dc:creator>
      <dc:date>2014-12-12T11:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSO and LDAP on Alfresco 5.0 b</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/sso-and-ldap-on-alfresco-5-0-b/m-p/312820#M265950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could try to do the following. AFAIK, you should to create the following directory structure&lt;BR /&gt;(&lt;EM&gt;all authentication subsystem types have the category Authentication. For example, the configuration for a particular subsystem instance of category A, type B, and name C should be under the path /shared/classes/alfresco/extension/subsystems/A/B/C&lt;/EM&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tomcat/shared/classes/alfresco/extension/subsystems/Authentication/ldap/ldap1/&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now copy here the &lt;STRONG&gt;ldap-ad-authentication.properties&lt;/STRONG&gt; file and specify there:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;...&lt;BR /&gt;authentication.chain=passthru1:passthru,ldap1:ldap,alfrescoNtlm1:alfrescoNtlm&lt;BR /&gt;ldap.authentication.active=false&lt;BR /&gt;ldap.authentication.userNameFormat=%s@your_domain_name_without_local_part_here&lt;BR /&gt;ldap.authentication.java.naming.provider.url=ldap://your_ldap_server_name_here:389&lt;BR /&gt;ldap.synchronization.java.naming.security.principal=domain_administrator_name_here@your_domain_name_without_local_part_here&lt;BR /&gt;ldap.synchronization.java.naming.security.credentials=domain_administrator_password_here&lt;BR /&gt;# You can browse the LDAP directory by using LdapAdminExe, for example.&lt;BR /&gt;ldap.synchronization.groupSearchBase=cn\=Groups,dc\=your_domain_name_without_local_part_here,dc\=local&lt;BR /&gt;ldap.synchronization.userSearchBase=cn\=Users,dc\=your_domain_name_without_local_part_here,dc\=local&lt;BR /&gt;ntlm.authentication.sso.enabled=true&lt;BR /&gt;passthru.authentication.defaultAdministratorUserNames=alfresco_administrator_name_here&lt;BR /&gt;passthru.authentication.domain=your_domain_name_without_local_part_here&lt;BR /&gt;passthru.authentication.servers=your_domain_name_without_local_part_here\\your_ldap_server_name_here&lt;BR /&gt;...&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;Note, that because the &lt;STRONG&gt;alfresco-global.properties&lt;/STRONG&gt; file is loaded last, you can override any of these properties there.&lt;/P&gt;&lt;P&gt;In &lt;STRONG&gt;tomcat/shared/classes/alfresco/web-extension/share-config-custom.xml&lt;/STRONG&gt; specify the following(find this element there and modify):&lt;/P&gt;&lt;PRE class="line-numbers language-markup"&gt;&lt;CODE&gt;...&lt;BR /&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;config&lt;/SPAN&gt; &lt;SPAN class="attr-name token"&gt;condition&lt;/SPAN&gt;&lt;SPAN class="attr-value token"&gt;&lt;SPAN class="punctuation token"&gt;=&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;"&lt;/SPAN&gt;Remote&lt;SPAN class="punctuation token"&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="attr-name token"&gt;evaluator&lt;/SPAN&gt;&lt;SPAN class="attr-value token"&gt;&lt;SPAN class="punctuation token"&gt;=&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;"&lt;/SPAN&gt;string-compare&lt;SPAN class="punctuation token"&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;remote&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;connector&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;id&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;connectorId&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;id&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;name&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;Alfresco Connector&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;name&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;description&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;...&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;description&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;class&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;org.alfresco.web.site.servlet.SlingshotAlfrescoConnector&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;class&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;connector&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;endpoint&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;id&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;alfresco&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;id&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;name&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;...&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;name&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;description&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;...&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;description&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;connector-id&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;connectorId&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;connector-id&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;endpoint-url&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;http://your_server_here:alfresco_port_here/alfresco/wcs&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;endpoint-url&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;identity&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;user&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;identity&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;&lt;/SPAN&gt;external-auth&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;true&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;external-auth&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;endpoint&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;remote&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="token tag"&gt;&lt;SPAN class="punctuation token"&gt;&amp;lt;/&lt;/SPAN&gt;config&lt;/SPAN&gt;&lt;SPAN class="punctuation token"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;...&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then restart the Alfresco server. In in alfresco.log you will see the output from the synchronization subsystem.&lt;BR /&gt;Synchronization subsystem will automatically create users and groups by retrieved them from Active Directory through the LDAP query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now you (and all domain users) can log in by using SSO. Also you can disable SSO and log in by using the ID and password of any of the Active Directory users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information see: &lt;A href="https://www.amazon.com/dp/0470571047/ref=rdr_ext_tmb" rel="nofollow noopener noreferrer"&gt;Professional Alfresco: Practical Solutions for Enterprise Content Management&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Jan 2017 17:54:18 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/sso-and-ldap-on-alfresco-5-0-b/m-p/312820#M265950</guid>
      <dc:creator>anon26949</dc:creator>
      <dc:date>2017-01-29T17:54:18Z</dc:date>
    </item>
  </channel>
</rss>

