|
Modify the <frevvo-home>\tomcat\conf\server.xml file. Here is an example of the changes needed when using tomcat.
Edit this file with a text editor.
Search for 'ldap://localhost:389 - you should find this in the org.apache.catalina.realm.JNDIRealm section of the file.
Notice lines 98 - 107 are commented out.
Uncomment this section. Replace the existing code with the code shown below:
Replace the connectionURL, connectionName and the connectionPassword default values with your LDAP server information.
Refer to this website for detailed information about the remaining parameters.
<Realm className="org.apache.catalina.realm.JNDIRealm" connectionURL="ldap://test.windows.frevvo.com:389" connectionName="TEST\Administrator" connectionPassword="FrevvoTest00" adCompat="true" referrals="follow" userBase="CN=Users,DC=test,DC=windows,DC=frevvo,DC=com" userSearch="(&(objectClass=user)(sAMAccountName={0}))" userSubtree="true" userRoleName="memberOf" roleBase="CN=Users,DC=test,DC=windows,DC=frevvo,DC=com" roleSubtree="true" roleName="cn" roleSearch="(&(objectClass=group)(member={0}))" /> |
5. Create a tenant with the LDAP Container Security Manager class.
6. Stop .
7. The <frevvo-home>\tomcat\webapps\frevvo.war file must be secure. This is done by enabling the <security-contraint/> found in the web.xml file included in the frevvo.war.
Follow these steps to secure web.xml:
a. Unzip <frevvo-home>\tomcat\webapps\frevvo.war to a temporary directory on your desk top.
b. Edit frevvo.war!WEB-INF/web.xml and uncomment the BASIC <security-constraint/> fragment.
c. Re-zip frevvo.war
Here is the sample <security-contraint/> found in web.xml:
<!-- Security constraint BASIC AUTH --> <security-constraint> <web-resource-collection> <web-resource-name>Secure frevvo</web-resource-name> <url-pattern>/*</url-pattern> </web-resource-collection> <auth-constraint> <role-name>frevvo.User</role-name> </auth-constraint> </security-constraint> <security-constraint> <web-resource-collection> <web-resource-name>Public Access</web-resource-name> <url-pattern>/heartbeat/*</url-pattern> <url-pattern>/web/public/*</url-pattern> <url-pattern>/js/*</url-pattern> <url-pattern>/css/*</url-pattern> <url-pattern>/images/*</url-pattern> <url-pattern>/fonts/*</url-pattern> </web-resource-collection> </security-constraint> <login-config> <auth-method>BASIC</auth-method> </login-config> <security-role> <role-name>frevvo.User</role-name> </security-role> |
8. Start .
Here are some quick tests to check if the LDAP Container Security Manager tenant configuration is correct:
Browse 'http://<IP>:<PORT>/frevvo/web/tn/<tenant id>/login'. Substitute the ip address/port of the server and the name of your LDAPCSM tenant for the tenant id. The browser authentication light-box displays.
Since you are using LDAP to define |
If the tenant admin user does not exist or it does not have the required roles, this error will display with the name of the tenant you are trying to add:
This error message can be seen in the <frevvo-home>\tomcat\logs\frevvo.log file if the LDAP-CSM tenant cannot be created.
Application error processing /frevvo/web/tn?edit=true javax.servlet.ServletException: javax.servlet.ServletException: Tenant admin user 111 does not exist! or Tenant admin user lll must have roles: [frevvo.TenantAdmin,frevvo.Designer] if the tenant admin exists but does not have the correct roles. |