I'm looking at using OpenKM as a replacement for an ancient DMS we have in our organization, and it looks like a great fit so far. I installed a fresh system this morning to put into practice what I've been learning, and started on the fresh build by adding LDAP access per the wiki. Authentication works great, and users that are in the AdminRole LDAP group get admin access, and users in the UserRole LDAP group get non-admin access. So far so good!
However, I can no longer manage Roles or assign Groups for security. If, for example, I delete the UserRole permissions for an item, when I go back into security for that item I see no Groups listed on the right side as available. Likewise, in the administration panels, I see no roles listed to filter my user list, and no roles listed when I go into the Roles link. I'm attaching screenshots that should make it clear what I'm describing. However, they clearly work as designed as I can log in with LDAP credentials and get the proper permissions based on my LDAP group membership.
I'm guessing I missed something in my LDAP settings, so here they are (munged slightly):
Chris
However, I can no longer manage Roles or assign Groups for security. If, for example, I delete the UserRole permissions for an item, when I go back into security for that item I see no Groups listed on the right side as available. Likewise, in the administration panels, I see no roles listed to filter my user list, and no roles listed when I go into the Roles link. I'm attaching screenshots that should make it clear what I'm describing. However, they clearly work as designed as I can log in with LDAP credentials and get the proper permissions based on my LDAP group membership.
I'm guessing I missed something in my LDAP settings, so here they are (munged slightly):
Code: Select all
Thanks in advance!principal.ldap.mail.attribute String mail
principal.ldap.mail.search.base String ou=staff,dc=nhusd,dc=k12,dc=ca,dc=us
principal.ldap.mail.search.filter String (&(objectClass=InetOrgPerson)(cn={0}))
principal.ldap.referral String follow
principal.ldap.role.attribute String cn
principal.ldap.role.search.base String ou=staff,dc=nhusd,dc=k12,dc=ca,dc=us
principal.ldap.role.search.filter String (objectClass=posixGroup)
principal.ldap.roles.by.user.attribute String cn
principal.ldap.roles.by.user.search.base String ou=Roles,ou=OpenKM,ou=ApplicationSupport,dc=nhusd,dc=k12,dc=ca,dc=us
principal.ldap.roles.by.user.search.filter String (memberID={0})
principal.ldap.security.credentials String ********
principal.ldap.security.principal String cn=admin*****
principal.ldap.server String ldap://host.domain.com:389/
principal.ldap.user.attribute String cn
principal.ldap.user.search.base String ou=staff,dc=nhusd,dc=k12,dc=ca,dc=us
principal.ldap.user.search.filter String (objectClass=inetOrgPerson)
principal.ldap.username.attribute String Edit Delete
principal.ldap.username.search.base String Edit Delete
principal.ldap.username.search.filter String Edit Delete
principal.ldap.users.by.role.attribute String memberUid
principal.ldap.users.by.role.search.base String ou=Roles,ou=OpenKM,ou=ApplicationSupport,dc=nhusd,dc=k12,dc=ca,dc=us
principal.ldap.users.by.role.search.filter String (&(objectClass=posixGroup)(cn={0}))Chris
