Macromedia live cycle 7.2 매뉴얼

다운로드
페이지 123
Adobe LiveCycle
Getting Started with BAM Server
Installing and Configuring LiveCycle for JBoss
 Configuring LDAP settings for BAM Server     93
Configuring automatic LDAP synchronization 
You can schedule the automatic synchronization of BAM Server with the LDAP server. Synchronization 
ensures that the user accounts and role definitions that BAM Server caches in the BAM metadata database 
are up to date with the content of the LDAP server.
During synchronization, BAM Server creates new roles based on any new groups in the LDAP server and 
removes existing roles based on any groups that have been removed from the LDAP server since the 
previous synchronization. 
Note:
Roles are removed even if users that were created manually are assigned to the roles. For these 
users, if the roles are removed due to synchronization, the user accounts still exist but are no longer 
assigned to the roles. 
To configure automatic LDAP synchronization: 
1. Start BAM Workbench by typing 
http://[host name]:[port]/celequest/workbench
 in the 
URL line of a web browser.
2. Click the Administration Console tab, and then click System Settings.
3. Click the LDAP Synchronization tab. 
4. Select the LDAP Enabled option, if it is not already selected. 
5. Specify values for the following properties: 
Initial Context Factory: The JNDI name through which BAM Server connects to the LDAP server. 
The default value is 
com.sun.jndi.ldap.LdapCtxFactory
. You probably do not need to 
change this value.
LDAP Server: The DNS name or IP address of the LDAP server.
LDAP Port: The port on which the LDAP server is running. The default port is typically 389. 
However, if you select the SSL option, the default port is typically 636. You must confirm with your 
LDAP administrator which port to specify.
LDAP SSL: Select this option if the LDAP server is configured to use SSL. Selecting this option may 
affect the LDAP Port setting. 
LDAP Authentication: The authentication method used by the LDAP server. Select one of the 
following options: 
Simple
SASL (Simple Authentication and Security Layer). Select this option for Sun ONE.
Compare Encrypted Password 
LDAP Principal DN Prefix: For the simple authentication method, the text you specify will be 
inserted before the user's login name:
For LDAP servers that require DN login, set this to the appropriate property value followed by an 
equal sign (for example, 
cn=
 or 
uid=
).
For ActiveDirectory, leave this value blank.