CMDBUILD+OPENLDAP Implementation Verification
PS: Because the operation of various tools too much, account management is too complex, so, with the LDAP centralized authentication is good. Here to explain Cmdbuild
Cmdbbuild specific functions do not do a specific explanation, here directly to explain.
Cmdbbuild-Side considerations:
In conjunction with LDAP, it is important to note that the CMDB side needs to have the appropriate users and groupings , of course, password arbitrary!
So
The configuration information is as follows:
## authentication method chain (The first match stops the auth chain) #auth. methods=headerauthenticator,casauthenticator,ldapauthenticator,dbauthenticator#auth.methods= ldapauthenticator,dbauthenticatorauth.methods=ldapauthenticator #这里必须将 (dbauthenticator) removed, The Dbauthenticator function is to authenticate the login using local database information. #serviceusers =portlet#serviceusers.privileged=workflow#force.ws.password.digest=true#### header### header.attribute.name=username#### cas## #cas. server.url=https://casserver/cas#cas.login.page=/login# cas.service.param=service#cas.ticket.param=ticket#### ldap# #ldap .server.address=192.168.*.* #ldap地址, of course, it could be a domain name or something. ldap.server.port=389ldap.use.ssl=falseldap.basedn=dc=***,dc= comldap.bind.attribute=uid # Local user name to LDAP authentication what entry #ldap.search.filter= (& (ObjectClass=MYCLASS1) (OBJECTCLASS=MYCLASS2) #search过滤 # #Accept only none (Anonymous bind) and simple (simple bind) only supports simple authentication and anonymous authentication #ldap.search.auth.method=none# #This section is only for simple bindldap.search.auth.method=simple #ldap. search.auth.principal=ou=people,dc=*** ,dc=com #ldap. search.auth.password=****
This article is from the "Tofu Blog" blog, make sure to keep this source http://407711169.blog.51cto.com/6616996/1535671