![]() ![]() ![]() ![]() ![]() ![]() |
This section describes the following optional advanced procedures for LDAP configuration:
The ldapws.war file contains the log4j.properties file. The log4j.properties controls the logging settings for the application. You can open the log4j.properties file and edit it within the ldapws.war file.
There are two appenders defined:
The default settings for the parameters in this file should be sufficient but there are several settings that you can change:
Within the ldapws.war file there is a web.xml file that contains settings for the application session. You can open this file and edit it within the ldapws.war file.
During large synchronizations, the portal must create database objects for all the users and groups returned by the LDAP IDS. This might cause session time-outs between the calls to GetGroups, GetUsers, and GetMembers.
You can avoid this time-out error by increasing the session-time-out value in the session-config object of web.xml.
LDAP servers allow you to set the maximum return size of a query result as well as the time limit for a query. If the LDAP IDS log file ever indicates a SizeLimitExceeded or TimeLimitExceeded error it is most likely that you need to adjust these values on the LDAP server. Different LDAP server administration consoles have these settings in different locations and you should contact your LDAP system administrator if you have questions about the location of the settings.
In order to use the LDAP IDS over SSL there are two connections you must secure. This section includes the following topics:
In order to connect to the LDAP IDS from the portal over SSL, you must connect to the remote server on an SSL port and import its trusted certificate.
From a Web browser on the portal server navigate to: https://<remote_server>:<app_server_ssl_port>
If the computer hosting the portal does not already have a certificate from the remote server it prompts you with a Security Alert. Choose to view the certificate and install it to the Trusted Root Certification Authorities store.
When running the installer for LDAP IDS, choose https protocol and enter the SSL port for the application server. In the portal, when you configure the remote server object, use https and the SSL port.
To connect to the LDAP server over SSL, import the certificate for the LDAP server into the cacerts file in the jre of the application server.
For instructions on using the keytool refer to the SunJava documentation.
When you create the authentication source in the portal, enter 2 as the Security Mode. The standard SSL port is 636. If your LDAP server is using a different SSL port, enter this in the Alternate Port box.
Plumtree Corporate Portal 5.0.x included a native LDAP provider. If you have been using the native LDAP provider, you may want to migrate your users to the LDAP IDS authentication source you created to preserve the MyPage and community settings.
Knowledge Base article DA_224007 “Migrating Users and Groups in 5.0.x Portals” discusses migrating users and groups in a 5.0.x portal. Read this article for instructions on the SQL commands needed to migrate the user information.
![]() ![]() ![]() |