Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 5.3
Section
Column

Sometimes, is deployed to an existing servlet container that is already handling user authentications through, for instance, LDAP. Here the authentication is the responsibility of the container, but is still responsible for the runtime authorization and the design time querying of user metadata. The LDAP Container Security Manager reuses the existing LDAP connector but relies on the container for user authentications.

 

 

Column
width300px

On this page:

Table of Contents
maxLevel2

...

  1. Stop  if it is running.
  2. Modify the <frevvo-home>\tomcat\conf\server.xml file. Here is an example of the changes needed when using tomcat.
    1. Edit this file with a text editor.
    2. Search for 'ldap://localhost:389 - you should find this in the org.apache.catalina.realm.JNDIRealm section of the file. 
    3. Notice lines 98 - 107 are commented out.
    4. Uncomment this section. Replace the existing code with the code shown below: 
    5. Replace the connectionURL, connectionName and the connectionPassword default values with your LDAP server information. 
    6. Refer to this website for detailed information about the remaining parameters.
Code Block
	<Realm className="org.apache.catalina.realm.JNDIRealm"
		connectionURL="ldap://test.windows.frevvo.com:389" connectionName="TEST\Administrator"
		connectionPassword="FrevvoTest00" adCompat="true" referrals="follow"
		
		userBase="CN=Users,DC=test,DC=windows,DC=frevvo,DC=com" userSearch="(&amp;(objectClass=user)(sAMAccountName={0}))"
		userSubtree="true" userRoleName="memberOf"
		
		roleBase="CN=Users,DC=test,DC=windows,DC=frevvo,DC=com" roleSubtree="true"
	    roleName="cn" roleSearch="(&amp;(objectClass=group)(member={0}))" /> 
     
      3.   Configure LDAP - The LDAP Container Security Manager uses the LDAP Security Manager so the setup for both is the same. Be sure to include all the context parameters needed. 

...

Section
Column
width20%

Column
width50%
      1. In the drop down Security Manager Class choose LDAP Container Security Manager. If your version does not have a drop down, enter the following in the Custom text box: com.frevvo.security.ldap.csm.LDAPContainerSecurityManager.
      2. Give it a tenant id. Provide the tenant name and description.
      3. The Max Concurrent Users is the maximum allowed by your license or less. Leave this field blank if you do not want to set a max.
      4. Specify the LDAP User ID that will have the tenant admin permission. The LDAP-CSM tenant admin must exist on the LDAP server and have the frevvo.TenantAdmin and frevvo.Designer roles.  
      5. Click Submit. You will see this message with the name of your newly created tenant and it will show in the tenant list.

Column
width25%

Tenant Admin Properties in Active Directory

...

  1. Browse 'http://<IP>:<PORT>/frevvo/web/tn/<tenant id>/login'. Substitute the ip address/port of the  server and the name of your LDAPCSM tenant for the tenant id. The browser authentication light-box displays.



  2. Login as the tenant admin for the LDAP-CSM tenant. This admin must have the frevvo.User role in addition to the frevvo.tenantadmin and frevvo.designer roles.
  3. Click Manage Roles. You should see a list of groups.



  4. Click the Back to Manage Tenant link.
  5. Click Manage Users. 
  6. Click All. You should see a list of LDAP users. 



  7. Now, click Back To Manage Tenant
  8. Log out from .
  9. Try to login with the user name and password of a user in the LDAP-CSM tenant. You do NOT need to specify the LDAP-CSM tenant when logging in. For instance, if nancy is a valid LDAP user you should log in as nancy. The password would be nancy's password in LDAP. User nancy's home page will display.



...