Running the ADAuthentication API Example
Compiling and Installing the Example
- Build the examples by following the instructions given in Building the Examples.
- Merge the enRoleAuthentication.properties file from the $ITIM_HOME/extensions/examples/authentication/adauthentication directory with the one present in the $ITIM_HOME/data directory.
- Copy the enRoleADAuthentication.properties file from the $ITIM_HOME/extensions/examples/authentication/adauthentication directory to $ITIM_HOME/data directory.
- Add the examples.jar file created by the build process to the application server's classpath
by following the instructions given in Adding examples.jar to Classpath.
Running the Example
This example disables ITIM's native password
checking and enables Active Directory authentication.
To test that it is installed correctly,
go to the standard ITIM Logon Page and login
with a valid userid which exists on the ActiveDirectory Server which you are using for accounts and with valid password i.e. password of the AD account.
- For AD authentication to work you have to have an ITIM account with same name as AD account name using which you want to login.
- You can login with fully qualified name like username@domain name or without domain like username if property useFullyQualifiedUserName is true, else you have to login without domain like username which would logon you on defaultActiveDirectoryDomain
Configuring enRoleADAuthentication.properties
useFullyQualifiedUserName if true then user can login either in the form of "user_name@my.active.directory.domain.com" or in the form "user_name"(with defaultActiveDirectoryDomain)
,if false then user have to login in the form of "user_name" with defaultActiveDirectoryDomain.
defaultActiveDirectoryDomain The default active directory domain to use.
defaultDnsServer The default DNS server to use.