AnsweredAssumed Answered

Alfresco LDAP and SSO

Question asked by cybermakoki on Jun 9, 2010
Hi all,

I'm working with Alfresco Enterprise 3.1 and I've currently configure alfresco to work with LDAP. This works fine, windows users can logon into alfresco

I've modified this files:


<alfresco-config area="file-servers">

   <!– To override the default Alfresco filesystem use replace="true", to –>
   <!– add additional filesystems remove the replace="true" attribute     –>
   <config evaluator="string-compare" condition="Filesystems" replace="true">
         <!– Alfresco repository access shared filesystem –>
         <filesystem name="${}">

         <!– Add a URL file to each folder that links back to the web client –>

         <!– Mark locked files as offline –>

         <!– Desktop actions –>
         <!– Uses a client-side application to trigger a server-side action                         –>
         <!–   Echo - displays a message echoed from the server                                     –>
         <!–   URL  - launches a URL via the Windows shell                                          –>
         <!–   CmdLine - launches the Notepad application                                           –>
         <!–   CheckInOut - checks files in/out, drag and drop files onto the application           –>
         <!–   JavaScript - run a server-side script                                                –>
         <!–   JavaScriptURL - server-side script that generates a URL to the folder using a ticket –>
         <!–                   to avoid having to logon                                             –>

               <attributes>anyFiles, multiplePaths , allowNoParams</attributes>
               <preprocess>confirm, copyToTarget</preprocess>

         <!– Additional access control of the filesystem –>
         <!– Access type of 'none' will stop the filesystem from showing up for that user/address/protocol –>          
            <accessControl default="Write">
               <user name="admin" access="Write"/>
               <address subnet="" mask="" access="Write"/>
         <!– AVM virtualization view of all stores/versions for WCM –>
         <!– virtual view can be any of the following: normal, site, staging, author, preview –>
         <avmfilesystem name="AVM">
            <virtualView stores="site,staging,author"/>
   <config evaluator="string-compare" condition="Filesystem Security" replace="true">
      <authenticator type="passthru" >
   <!–<authenticator type="alfresco" />–>
   <config evaluator="string-compare" condition="CIFS Server" replace="true">
      <serverEnable enabled="false"/>
      <host name="${cifs.localname}A" domain="${cifs.domain}"/>
      <comment>Alfresco CIFS Server</comment>

      <!– Set to the broadcast mask for the subnet –>
      <!– Set to the IP for the adapter for Java socket –>

      <!– Use Java socket based NetBIOS over TCP/IP and native SMB on linux –>
      <tcpipSMB ipv6="${cifs.ipv6}" platforms="linux,solaris,macosx"/>
      <netBIOSSMB bindto="${cifs.bindto}" platforms="linux,solaris,macosx"/>
      <!– Can be mapped to non-privileged ports, then use firewall rules to forward
            requests from the standard ports –>
      <tcpipSMB port="1445" ipv6="${cifs.ipv6}" platforms="linux,solaris,macosx"/>
      <netBIOSSMB sessionPort="1139" namePort="1137" datagramPort="1138" platforms="linux,solaris,macosx"/>

      <!– Announce the server to the workgroup/domain –>
      <!– Use enabled="false" attribute to disable announcements –>             
      <hostAnnounce interval="5" enabled="${cifs.hostannounce}"/>

      <!– Use Win32 NetBIOS interface on Windows –>

      <!– Announce the server to the workgroup/domain –>
      <!– Use enabled="false" attribute to disable announcements –>             
      <Win32Announce interval="5" enabled="${cifs.hostannounce}"/>

      <!– CIFS authentication –>
      <!– Available types are 'alfresco', 'passthru' and 'enterprise' –>
    <!–  <authenticator type="passthru">
     <authenticator type="alfresco"/>
      <!– CIFS Passthru authentication sample –>
      <!– Also see the <DomainMappings> config in the 'Filesystem Security' section below –>
      <authenticator type="passthru">
      <!– CIFS Enterprise authentication sample with Kerberos –>
      <authenticator type="enterprise">
      <!– Disable the use of asynchronous sockets/NIO code –>
      <!– Disable the use of JNI code –>
      <!– Only currently affects Windows –>
      <!– Session timeout, in seconds –>
      <!– Defaults to 15 minutes, to match the default Windows client setting        –>
      <!– If no I/O is received within that time the session is closed by the server –>
      <!– Enable WINS if used for NetBIOS name lookups –>
      <!– CIFS server debug settings –>
      <!– Enable '' in file –>
      <sessionDebug flags="Negotiate,Socket"/>

   <config evaluator="string-compare" condition="FTP Server" replace="true">
      <!–<serverEnable enabled="${ftp.enabled}"/>–>
     <serverEnable enabled="false"/>
      <!– Run on a non-privileged port –>

     <!– IPv6 support –>
     <IPv6 state="${ftp.ipv6}"/>
      <!– FTP authentication –>
      <!– Available types are 'alfresco' and 'passthru' –>
      <authenticator type="passthru"/>
      <!– FTP server debug settings –>
      <!– Enable '' in file –>
      <debug flags="File,Search,Error,Directory,Info,DataPort"/>
   <config evaluator="string-compare" condition="NFS Server">
      <serverEnable enabled="${nfs.enabled}"/>

      <!– Map NFS user/group ids to Alfresco users –>     
            <user name="admin" uid="0" gid="0"/>

# This properties file brings together the common options for LDAP authentication rather than editing the bean definitions

# How to map the user id entered by the user to taht passed through to LDAP
# - simple
#    - this must be a DN and would be something like
#      CN=%s,DC=company,DC=com
# - digest
#    - usually pass through what is entered
#      %s    


# The LDAP context factory to use

# The URL to connect to the LDAP server

# The authentication mechanism to use

# The default principal to use (only used for LDAP sync)

# The password for the default principal (only used for LDAP sync)*********

# Escape commas entered by the user at bind time
# Useful when using simple authentication and the CN is part of the DN and contains commas

# Escape commas entered by the user when setting the authenticated user
# Useful when using simple authentication and the CN is part of the DN and contains commas, and the escaped \, is
# pulled in as part of an LDAP sync
# If this option is set to true it will break the default home folder provider as space names can not contain \

And i have added this lines in authentication-services-context.xml to enable daisy chaining

<bean id="authenticationComponentChain" class="">
      <property name="authenticationComponents">
            <ref bean="authenticationComponentAlfresco"/>
            <ref bean="authenticationComponent"/>

   <bean id="authenticationComponentAlfresco" class="" parent="authenticationComponentBase">
      <property name="authenticationDao">
         <ref bean="authenticationDao"/>
         <property name="authenticationManager">
            <ref bean="authenticationManager"/>
      <property name="allowGuestLogin">
      <property name="transactionService">
            <ref bean="transactionService" />
        <property name="nodeService">
            <ref bean="nodeService" />
      <property name="personService">
            <ref bean="personService" />

So this works fine, but i want to enable SSO because internet explorer is asking for username and password everytime i login into alfresco…

How can I enable SSO? I've read a lot of posts and wiki and I'm not have been able to do this :(

Can anybody help me?