11-04-2010 01:35 PM
…
authentication.chain=alfrescoNtlm1:alfrescoNtlm,ldap1:ldap
…
#
# OPENLDAP AUTH+SYNC
#————-
ldap.authentication.active=true
ldap.authentication.allowGuestLogin=true
#ldap.authentication.userNameFormat=mail\=%s,jvd\=cdomain.tld,ou\=customers,dc\=tao,dc\=intranet
ldap.authentication.userNameFormat=%s
ldap.authentication.java.naming.factory.initial=com.sun.jndi.ldap.LdapCtxFactory
ldap.authentication.java.naming.provider.url=ldap://tao-dev-auth02.tao.intranet:389
#ldap.authentication.java.naming.security.authentication=simple
ldap.authentication.java.naming.security.authentication=DIGEST-MD5
ldap.authentication.escapeCommasInBind=false
ldap.authentication.escapeCommasInUid=false
ldap.authentication.defaultAdministratorUserNames=tao-admin
ldap.synchronization.active=true
#ldap.synchronization.java.naming.security.principal=cn\=alfresco,ou\=services,ou\=mgnt,dc\=tao,dc\=intranet
ldap.synchronization.java.naming.security.principal=service.alfresco
ldap.synchronization.java.naming.security.credentials=****************
ldap.synchronization.queryBatchSize=1000
ldap.synchronization.groupQuery=(objectclass\=groupOfNames)
ldap.synchronization.groupDifferentialQuery=(&(objectclass\=groupOfNames)(!(modifyTimestamp<\={0})))
ldap.synchronization.personQuery=(objectclass\=inetOrgPerson)
ldap.synchronization.personDifferentialQuery=(&(objectclass\=inetOrgPerson)(accountActive\=TRUE)(delete\=FALSE)(!(modifyTimestamp<\={0})))
ldap.synchronization.groupSearchBase=ou\=Groups,jvd\=cdomain.tld,ou\=customers,dc\=tao,dc\=intranet
ldap.synchronization.userSearchBase=jvd\=cdomain.tld,ou\=customers,dc\=tao,dc\=intranet
ldap.synchronization.modifyTimestampAttributeName=modifyTimestamp
ldap.synchronization.timestampFormat=yyyyMMddHHmmss'Z'
ldap.synchronization.userIdAttributeName=mail
ldap.synchronization.userFirstNameAttributeName=givenName
ldap.synchronization.userLastNameAttributeName=sn
ldap.synchronization.userEmailAttributeName=mail
ldap.synchronization.userOrganizationalIdAttributeName=o
ldap.synchronization.defaultHomeFolderProvider=userHomesHomeFolderProvider
ldap.synchronization.groupIdAttributeName=cn
ldap.synchronization.groupType=groupOfNames
ldap.synchronization.personType=inetOrgPerson
ldap.synchronization.groupMemberAttributeName=member
synchronization.synchronizeChangesOnly=false
synchronization.import.cron=0 0 0 * * ?
synchronization.syncWhenMissingPeopleLogIn=false
synchronization.syncOnStartup=true
synchronization.autoCreatePeopleOnLogin=true
<</alfresco-global.properties>>…
<!– The authentication mechanism to use –>
<!– Some sasl authentication mechanisms may require a realm to be set –>
<!– java.naming.security.sasl.realm –>
<!– The available options will depend on your LDAP provider –>
<entry key="java.naming.security.authentication">
<value>${ldap.authentication.java.naming.security.authentication}</value>
</entry>
…
<</common-ldap-context.xml>>…
ldap.authentication.java.naming.security.sasl.realm=single
ldap.synchronization.java.naming.security.sasl.realm=single
…
<</alfresco-global.properties>>…
java.naming.security.sasl.realm=single
…
<</alfresco-global.properties>>11-04-2010 02:13 PM
Caused by: javax.naming.AuthenticationException: [LDAP: error code 49 - SASL(-13): user not found: no secret in database]
Which is correct because the realm single was not used. openldap cannot translate the sasl authenticationID to an existing ldap dn.Caused by: javax.naming.AuthenticationException: [LDAP: error code 49 - SASL(-13): authentication failure: realm changed: authentication aborted]
…
<!– The authentication mechanism to use –>
<!– Some sasl authentication mechanisms may require a realm to be set –>
<!– java.naming.security.sasl.realm –>
<!– The available options will depend on your LDAP provider –>
<entry key="java.naming.security.authentication">
<value>${ldap.authentication.java.naming.security.authentication}</value>
</entry>
…
<</common-ldap-context.xml<!– The authentication mechanism to use –>
<!– Some sasl authentication mechanisms may require a realm to be set –>
<!– java.naming.security.sasl.realm –>
<entry key="java.naming.security.sasl.realm">
<value>${ldap.synchronization.java.naming.security.sasl.realm}</value>
</entry>
<!– The available options will depend on your LDAP provider –>
<entry key="java.naming.security.authentication">
<value>${ldap.authentication.java.naming.security.authentication}</value>
</entry>
<</common-ldap-context.xml>>…
# The SASL realm
ldap.synchronization.java.naming.security.sasl.realm=
…
<</ldap-authentication.properties>>…
ldap.synchronization.java.naming.security.sasl.realm=single
…
<</alfresco-global.properties>>Caused by: javax.naming.AuthenticationException: [LDAP: error code 49 - SASL(-13): authentication failure: realm changed: authentication aborted]
Tags
Find what you came for
We want to make your experience in Hyland Connect as valuable as possible, so we put together some helpful links.