ldap-authentication.properties
#
# This properties file brings together the common options for LDAP authentication rather than editing the bean definitions
#
# How to map the user id entered by the user to taht passed through to LDAP
# - simple
# - this must be a DN and would be something like
# CN=%s,DC=company,DC=com
# - digest
# - usually pass through what is entered
# %s
ldap.authentication.userNameFormat=uid=%s,DC=server,DC=pt
# The LDAP context factory to use
ldap.authentication.java.naming.factory.initial=com.sun.jndi.ldap.LdapCtxFactory
# The URL to connect to the LDAP server
ldap.authentication.java.naming.provider.url=ldap://192.168.100.1:389
# The authentication mechanism to use
ldap.authentication.java.naming.security.authentication=SIMPLE
#ldap.authentication.java.naming.security.authentication=DIGEST-MD5
# The default principal to use (only used for LDAP sync)
ldap.authentication.java.naming.security.principal=CN=admin,DC=server,DC=pt
# The password for the default principal (only used for LDAP sync)
ldap.authentication.java.naming.security.credentials=password
# Escape commas entered by the user at bind time
# Useful when using simple authentication and the CN is part of the DN and contains commas
ldap.authentication.escapeCommasInBind=false
# Escape commas entered by the user when setting the authenticated user
# Useful when using simple authentication and the CN is part of the DN and contains commas, and the escaped , is
# pulled in as part of an LDAP sync
# If this option is set to true it will break the default home folder provider as space names can not contain
ldap.authentication.escapeCommasInUid=false
ldap-synchronisation.properties
# This properties file is used to configure LDAP syncronisation
#
# The query to find the people to import
ldap.synchronisation.personQuery=(objectclass=inetOrgPerson)
# The search base of the query to find people to import
ldap.synchronisation.personSearchBase=OU=utilizadores,DC=server,DC=pt
# The attribute name on people objects found in LDAP to use as the uid in Alfresco
ldap.synchronisation.userIdAttributeName=uid
# The attribute on person objects in LDAP to map to the first name property in Alfresco
ldap.synchronisation.userFirstNameAttributeName=givenName
# The attribute on person objects in LDAP to map to the last name property in Alfresco
ldap.synchronisation.userLastNameAttributeName=sn
# The attribute on person objects in LDAP to map to the email property in Alfresco
ldap.synchronisation.userEmailAttributeName=mail
# The attribute on person objects in LDAP to map to the organizational id property in Alfresco
ldap.synchronisation.userOrganizationalIdAttributeName=o
# The default home folder provider to use for people created via LDAP import
ldap.synchronisation.defaultHomeFolderProvider=personalHomeFolderProvider
# The query to find group objects
ldap.synchronisation.groupQuery=(objectclass=groupofnames)
# The search base to use to find group objects
ldap.synchronisation.groupSearchBase=OU=grupos,DC=server,DC=pt
# The attribute on LDAP group objects to map to the gid property in Alfrecso
ldap.synchronisation.groupIdAttributeName=cn
# The group type in LDAP
ldap.synchronisation.groupType=groupofnames
# The person type in LDAP
ldap.synchronisation.personType=inetOrgPerson
# The attribute in LDAP on group objects that defines the DN for its members
ldap.synchronisation.groupMemberAttributeName=member
# The cron expression defining when people imports should take place
ldap.synchronisation.import.person.cron=0 0 * * * ?
# The cron expression defining when group imports should take place
ldap.synchronisation.import.group.cron=0 30 * * * ?
# Should all groups be cleared out at import time?
# - this is safe as groups are not used in Alfresco for other things (unlike person objects which you should never clear out during an import)
# - setting this to true means old group definitions will be tidied up.
ldap.synchronisation.import.group.clearAllChildren=true
LOG
02:47:00,302 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for ricardo.santos
02:47:00,467 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for ricardo.serra
02:47:00,520 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for filipe.andre
02:47:00,612 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for teste
02:48:00,214 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for ricardo.santos
02:48:00,221 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for ricardo.serra
02:48:00,236 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for filipe.andre
02:48:00,269 DEBUG [org.alfresco.repo.security.authentication.ldap.LDAPPersonExportSource] Adding user for teste