The examples described here has been shared by OpenKM users and should be taken with care.
Jboss LDAP example 1
LDAP Structure
dc=fr dc=soc ou=groups cn=UserRole, objectClass=posixGroup, memberUid = jack, memberUid = joe cn=AdminRole, objectClass=posixGroup, memberUid = jack ou=people ou=intern cn = jack, objectClass=inetOrgperson, uid = jack cn = joe, objectClass=inetOrgperson, uid = joe
Configuration parameters
principal.adapter=com.openkm.principal.LdapPrincipalAdapter principal.database.filter.inactive.users=true principal.ldap.mail.attribute=mail principal.ldap.mail.search.base=ou=intern,ou=users,dc=soc,dc=fr principal.ldap.mail.search.filter=(&(objectClass=inetOrgPerson)(cn={0})) principal.ldap.referral=follow principal.ldap.role.attribute=cn principal.ldap.role.search.base=ou=groups,dc=soc,dc=fr principal.ldap.role.search.filter=(objectClass=posixGroup) principal.ldap.roles.by.user.attribute=cn principal.ldap.roles.by.user.search.base=ou=groups,dc=soc,dc=fr principal.ldap.roles.by.user.search.filter=(memberUid={0}) principal.ldap.security.credentials?xxxxxx principal.ldap.security.principal=cn=admin,dc=soc,dc=fr principal.ldap.server=ldap://192.168.xxx.xxx:389 principal.ldap.user.attribute=cn principal.ldap.user.search.base=ou=intern,ou=users,dc=soc,dc=fr principal.ldap.user.search.filter=(objectClass=inetOrgPerson) principal.ldap.users.by.role.attribute=memberUid principal.ldap.users.by.role.search.base=ou=groups,dc=soc,dc=fr principal.ldap.users.by.role.search.filter=(&(objectClass=posixGroup)(cn={0})) system.login.lowercase=true
login-config.xml
name="OpenKM"> > code="org.jboss.security.auth.spi.LdapExtLoginModule" flag="required" > name="java.naming.provider.url"> ldap://192.168.xxx.xxx:389
沒有留言:
張貼留言