<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ldap-ad: allow login for users of specific security group in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16529#M7316</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, Martin's&amp;nbsp;query will work for the users under defined user base.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But maybe the&amp;nbsp;differential query will not, because you deal everything inside the AD group, so the timestamp of the user is not touched when adding users to the AD group (&lt;SPAN style="color: #333333; background-color: #fdfdfd; font-size: 13.3333px;"&gt;whenChanged)&lt;/SPAN&gt;. A walkaround for this is to define user differential query equal to user query, but&amp;nbsp;full sync is done everyday instead of differential.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another way of selecting a group of users belonging to&amp;nbsp;different levels in the AD, is via custom extension attributes in AD (i.e: "alf") users, so&amp;nbsp;you have to include the extension attribute in the users query. This will respect whenChanged parameter, because the user is modified (changing the timestamp) when applying the extension attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;--C.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Mar 2017 19:14:43 GMT</pubDate>
    <dc:creator>cesarista</dc:creator>
    <dc:date>2017-03-16T19:14:43Z</dc:date>
    <item>
      <title>ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16526#M7313</link>
      <description>Hello,I am running Alfresco Community Edition 201702 and trying to get ldap-ad authentication to work to my liking. I would like Alfresco to synchronize with our Active Directory, but only allow users of a specific group (AlfrescoUsers) to login to Alfresco, and deny any other login attempts.Current</description>
      <pubDate>Thu, 16 Mar 2017 15:25:06 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16526#M7313</guid>
      <dc:creator>jahu</dc:creator>
      <dc:date>2017-03-16T15:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16527#M7314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your person LDAP query seems to be wrong:&lt;/P&gt;&lt;P&gt;(&amp;amp;(objectclass\=user)(userAccountControl\:1.2.840.113556.1.4.803\:\=512)(|(memberOf=cn\=AlfrescoUsers,ou=Alfresco,ou=Groups,dc=domain,dc=net)))&lt;/P&gt;&lt;P&gt;i think you want objectclass=user AND userAcountControl... AND memberOf... but you put an OR "|" before memberOf condition.&lt;/P&gt;&lt;P&gt;So&lt;/P&gt;&lt;P&gt;(&amp;amp;(objectclass\=user)(userAccountControl\:1.2.840.113556.1.4.803\:\=512)(memberOf=cn\=AlfrescoUsers,ou=Alfresco,ou=Groups,dc=domain,dc=net))&lt;/P&gt;&lt;P&gt;should be ok (without having verified it in real life).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Mar 2017 16:47:56 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16527#M7314</guid>
      <dc:creator>mehe</dc:creator>
      <dc:date>2017-03-16T16:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16528#M7315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Who do you want to show up in Alfresco? If the answer is "everyone in LDAP" while the answer to "Who do you want to be able to authenticate?" is "a subset of users as specified by this group" then the answer is that you have to create two LDAP configurations, one will be enabled for sync-only and will sync the entire LDAP directory. The other will be disabled for sync but enabled for authentication and it will specify the person query that points to the group you want to restrict to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should mention that this technique was first described to me by Axel Faust in the #alfresco IRC channel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Mar 2017 18:00:26 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16528#M7315</guid>
      <dc:creator>jpotts</dc:creator>
      <dc:date>2017-03-16T18:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16529#M7316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, Martin's&amp;nbsp;query will work for the users under defined user base.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But maybe the&amp;nbsp;differential query will not, because you deal everything inside the AD group, so the timestamp of the user is not touched when adding users to the AD group (&lt;SPAN style="color: #333333; background-color: #fdfdfd; font-size: 13.3333px;"&gt;whenChanged)&lt;/SPAN&gt;. A walkaround for this is to define user differential query equal to user query, but&amp;nbsp;full sync is done everyday instead of differential.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another way of selecting a group of users belonging to&amp;nbsp;different levels in the AD, is via custom extension attributes in AD (i.e: "alf") users, so&amp;nbsp;you have to include the extension attribute in the users query. This will respect whenChanged parameter, because the user is modified (changing the timestamp) when applying the extension attribute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;--C.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Mar 2017 19:14:43 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16529#M7316</guid>
      <dc:creator>cesarista</dc:creator>
      <dc:date>2017-03-16T19:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16530#M7317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All users are allowed to authenticate via LDAP-AD in principle. By default Alfresco, create and sync accounts on login when they does not exist. But if you set the properties below, you would&amp;nbsp;restrict the ldap auth only to those synced users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;create.missing.people=false&lt;BR /&gt;synchronization.autoCreatePeopleOnLogin=false&lt;BR /&gt;synchronization.syncWhenMissingPeopleLogIn=false&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;--C.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Mar 2017 19:27:11 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16530#M7317</guid>
      <dc:creator>cesarista</dc:creator>
      <dc:date>2017-03-16T19:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16531#M7318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;...the query I mentioned is exact the one Jason has defined in his attached alfresco-global.properties. He just added the OR sign in the query, which should not be the case for his intentions.&lt;/P&gt;&lt;P&gt;He also defined the differential query in then right way (again, just the OR sign is too much)&lt;/P&gt;&lt;P&gt;Because the query will only import Users which are members of ou=Alfresco, only those user will be able to login (allowDeletions=true, so the user not in ou=Alfresco will be deleted - no login possible).&lt;/P&gt;&lt;P&gt;I would let synchronization.syncWhen... =true, so new users in ou Alfresco will be able to log in without having to wait for a scheduled LDAP Sync - what do you think Cesar?&lt;/P&gt;&lt;P&gt;Setting the two other values (create) to false should be fine.&lt;/P&gt;&lt;P&gt;Are you sure that a change in "memberOf" would not affect the whenChanged/modifiedTimestamp setting?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Mar 2017 20:04:40 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16531#M7318</guid>
      <dc:creator>mehe</dc:creator>
      <dc:date>2017-03-16T20:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16532#M7319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all for your help and suggestions. I have applied all of the changes/additions that you have suggested, and I believe it is working for me now. These are the changes/additions I've made to the&amp;nbsp;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;alfresco-global.properties configuration file:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;Added:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;create.missing.people=false&lt;BR /&gt;synchronization.autoCreatePeopleOnLogin=false&lt;BR /&gt;synchronization.syncWhenMissingPeopleLogIn=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;I also changed my person queries as well:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;ldap.synchronization.personQuery=(&amp;amp;(objectclass\=user)(userAccountControl\:1.2.840.113556.1.4.803\:\=512)(memberOf=cn\=AlfrescoUsers,ou=Alfresco,ou=Groups,dc=domain,dc=com))&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;ldap.synchronization.personDifferentialQuery=(&amp;amp;(objectclass\=user)(userAccountControl\:1.2.840.113556.1.4.803\:\=512)(&amp;amp;(memberOf=cn\=AlfrescoUsers,ou=Alfresco,ou=groups,dc=domain,dc=com))(!(modifyTimestamp&amp;lt;\={0})))&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;(basically just change OR to AND).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;One more question: Because I was syncing all users before, any users that were synced before I made the configuration change are still able to login. Is there a way to clear Alfresco's user/authentication cache, or (this may be an entirely different subject) is there a way to make Alfresco sync directly from AD, instead of caching users?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;Thank you all again, I appreciate it!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;-Jason&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Mar 2017 21:17:14 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16532#M7319</guid>
      <dc:creator>jahu</dc:creator>
      <dc:date>2017-03-16T21:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16533#M7320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martin:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding&amp;nbsp;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;synchronization.syncWhen... =true, I'm not completely sure if this property depends on the other ones. By the way, with the new OOTB Support Tools addon, I think you can run the scheduled job on demand (I did not tested yet). If it is not possible it would be a nice feature for Support Tools in Beecon hackathon (&lt;B&gt;Axel Faust&lt;/B&gt;‌).&lt;/SPAN&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;&amp;nbsp;This is a nice feature&amp;nbsp;of the Support Tools in EE edition.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;If you only change the group object I will say no. Before, you may do a minor "tricky" user modification to change&amp;nbsp;the timestamp, and it will work for this user.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;Regards.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;--C.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 08:34:10 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16533#M7320</guid>
      <dc:creator>cesarista</dc:creator>
      <dc:date>2017-03-17T08:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16534#M7321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Scheduled Jobs" tool is already included in OOTBee Support Tools. What might be of added value in the future might be to provide a tool for configuring LDAP at runtime so your test cycles can be shorter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 08:35:57 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16534#M7321</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-03-17T08:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16535#M7322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think the users are cached but not deleted by now. You can see this in the user administration (admin console). Because your ...allowDeletions flag is true, all you need is a full-sync.&lt;/P&gt;&lt;P&gt;Your can force this by temporarily setting the differential query to the same value as the full query like&amp;nbsp;&lt;B&gt;Cesar Capillas&lt;/B&gt;&amp;nbsp;mentioned above, and restart alfresco.&lt;/P&gt;&lt;P&gt;But alfresco has already created a user home for each of your users. These home directories will not be deleted (this is normally a good thing, because you don't want to have user-data deleted when you accidentally misconfigured the sync).&lt;/P&gt;&lt;P&gt;Make sure the value of&amp;nbsp;&lt;SPAN style="color: #58595b; background-color: #ffffff;"&gt;synchronization.allowDeletions&amp;nbsp;is really true, because if set to false, all your unwanted-synced users will only be untagged and converted to local users (uahhh). But this is explained in the docs&amp;nbsp;&lt;A href="http://docs.alfresco.com/5.2/concepts/sync-delete.html" rel="nofollow noopener noreferrer"&gt;http://docs.alfresco.com/5.2/concepts/sync-delete.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I fear you'd have to write a script to delete the home-folders of the non-existing/allowed users. Maybe someone in the community has done that already.&lt;/P&gt;&lt;P&gt;...or you just don't care about the unused folders&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://connect.hyland.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;- but they can behave bad, when you sync a formerly not allowed user. Then a second home folder with a number added to the username will be created.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 08:37:36 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16535#M7322</guid>
      <dc:creator>mehe</dc:creator>
      <dc:date>2017-03-17T08:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16536#M7323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cesar,&lt;/P&gt;&lt;P&gt;thank you for clarifying the "memberOf" thing - I always wondered why some users weren't synced like expected, but a few days later they were in sync - probably of some change I didn't notice (bad password time...)&lt;/P&gt;&lt;P&gt;I also saw that whenChanged seem not to be propagated between multiple DCs, which has the effect that I had to use a distinct DC for syncing...&lt;/P&gt;&lt;P&gt;...and thanks to&amp;nbsp;&lt;B&gt;Axel Faust&lt;/B&gt;&amp;nbsp;and the others who work(ed) on the OOTBee Support Tools &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://connect.hyland.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 08:46:16 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16536#M7323</guid>
      <dc:creator>mehe</dc:creator>
      <dc:date>2017-03-17T08:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16537#M7324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe a modification of this script helps (for iterating between a defined array of users, and not for all users). Be careful with deletions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="" href="https://angelborroy.wordpress.com/2017/02/08/alfresco-massive-delete-of-users/" title="https://angelborroy.wordpress.com/2017/02/08/alfresco-massive-delete-of-users/" rel="nofollow noopener noreferrer"&gt;Alfresco, massive delete of users | Programming and So&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;--C.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 08:53:53 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16537#M7324</guid>
      <dc:creator>cesarista</dc:creator>
      <dc:date>2017-03-17T08:53:53Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16538#M7325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even if you have the allowDeletions set to false you can still technically trigger a synchronisation that deletes users that should no longer exist. This can be done via the JavaScript Console tool and I have a &lt;A href="https://gist.github.com/AFaust/beaa309837397abf961f#file-triggerusersynchintxn-js-L1" rel="nofollow noopener noreferrer"&gt;Gist&lt;/A&gt; that shows how synchronisation can be triggered with a different setting than may be configured for synchronisation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 09:00:26 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16538#M7325</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-03-17T09:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16539#M7326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;...I should setup a knowledge base for things like these with a sophisticated solr/elasticsearch index &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://connect.hyland.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Thanx again Axel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 10:01:04 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16539#M7326</guid>
      <dc:creator>mehe</dc:creator>
      <dc:date>2017-03-17T10:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16540#M7327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah, thank you. If you can't tell already, I'm extremely green with Alfresco! I didn't know it was as easy as removing the user in the admin console, I figured there would be more cleanup to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not worried about the users home directory, those can live on into eternity. If I do run into problems later on, I will find a way to remove them, most likely using Cesar's suggestion with modifying the mass user deletion script he linked to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more side question since it's been mentioned a few times: Is the only way to do a full sync is&amp;nbsp;by setting the differential query the same as the full query, then restarting the Alfresco server?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again everyone!&lt;/P&gt;&lt;P&gt;-Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 15:02:54 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16540#M7327</guid>
      <dc:creator>jahu</dc:creator>
      <dc:date>2017-03-17T15:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16541#M7328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No - there are alternatives. See my response further up the chain. Using the JavaScript Console you can always trigger a full synchronisation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 15:17:57 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16541#M7328</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-03-17T15:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16542#M7329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, you can also set:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;synchronization.synchronizeChangesOnly=false&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #727174; background-color: #ffffff;"&gt;The default is true. &lt;/SPAN&gt;But this only applies on cron syncs, not for the subsystem startup for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;--C.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 15:19:00 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16542#M7329</guid>
      <dc:creator>cesarista</dc:creator>
      <dc:date>2017-03-17T15:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16543#M7330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason, no (see the other answers) but it is an easy way to force the full sync if you need it just now - without installing anything else.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 15:33:51 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16543#M7330</guid>
      <dc:creator>mehe</dc:creator>
      <dc:date>2017-03-17T15:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16544#M7331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Axel,&amp;nbsp;I tried with JS Console with the mentioned script.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I run the script and I obtained this&amp;nbsp;error in JS Console,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;500 Internal Error&lt;BR /&gt;Stacktrace-Details:&lt;BR /&gt;org.springframework.extensions.webscripts.WebScriptException: 02170092 Wrapped Exception (with status template): A valid SecureContext was not provided in the RequestContext&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;Caused by: net.sf.acegisecurity.AuthenticationCredentialsNotFoundException: A valid SecureContext was not provided in the RequestContext&lt;BR /&gt; at net.sf.acegisecurity.intercept.AbstractSecurityInterceptor.credentialsNotFound(AbstractSecurityInterceptor.java:481)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;But the INFO logs in catalina.out seem correct and without errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;2017-03-17 16:40:56,596 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Synchronizing users and groups with user registry 'myldap'&lt;BR /&gt; 2017-03-17 16:40:56,642 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Retrieving groups changed since 13-mar-2017 11:25:54 from user registry 'myldap'&lt;BR /&gt; 2017-03-17 16:40:56,668 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Synchronization,Category=directory,id1=myldap,id2=1 Group Analysis: Commencing batch of 0 entries&lt;BR /&gt; 2017-03-17 16:40:56,668 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Synchronization,Category=directory,id1=myldap,id2=1 Group Analysis: Completed batch of 0 entries&lt;BR /&gt; 2017-03-17 16:40:56,670 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Retrieving users changed since 13-mar-2017 11:21:34 from user registry 'myldap'&lt;BR /&gt; 2017-03-17 16:40:56,674 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Synchronization,Category=directory,id1=myldap,id2=6 User Creation and Association: Commencing batch of 16 entries&lt;BR /&gt; 2017-03-17 16:40:56,752 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Synchronization,Category=directory,id1=myldap,id2=6 User Creation and Association: Processed 16 entries out of 16. 100% complete. Rate: 205 per second. 0 failures detected.&lt;BR /&gt; 2017-03-17 16:40:56,753 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Synchronization,Category=directory,id1=myldap,id2=6 User Creation and Association: Completed batch of 16 entries&lt;BR /&gt; 2017-03-17 16:40:56,788 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] Finished synchronizing users and groups with user registry 'myldap'&lt;BR /&gt; 2017-03-17 16:40:56,788 INFO [security.sync.ChainingUserRegistrySynchronizer] [http-apr-8080-exec-10] 16 usuarios y 0 grupos procesados&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it have sense ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;--C.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 15:53:40 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16544#M7331</guid>
      <dc:creator>cesarista</dc:creator>
      <dc:date>2017-03-17T15:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: ldap-ad: allow login for users of specific security group</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16545#M7332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should not have any issues / errors executing that script. Are you executing it with a proper authentication (you can set other runAs contexts with JavaScript Console)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2017 16:30:51 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/ldap-ad-allow-login-for-users-of-specific-security-group/m-p/16545#M7332</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2017-03-17T16:30:51Z</dc:date>
    </item>
  </channel>
</rss>

