<h1class="sectionedit1"id="using_lemonldapng_with_active-directory">Using LemonLDAP::NG with Active-Directory</h1>
<divclass="level1">
</div>
<!-- EDIT1 SECTION "Using LemonLDAP::NG with Active-Directory" [1-57] -->
<h2class="sectionedit2"id="authentication_with_loginpassword">Authentication with login/password</h2>
<divclass="level2">
<p>
To use Active Directory as LDAP backend, you must change few things in the manager :
</p>
<ul>
<liclass="level1"><divclass="li"> Use “Active Directory” as authentication, userDB and passwordDBbackends,</div>
</li>
<liclass="level1"><divclass="li"> Export sAMAccountName in a variable declared in <ahref="exportedvars.html"class="wikilink1"title="documentation:2.0:exportedvars">exported variables</a></div>
</li>
<liclass="level1"><divclass="li"> Change the user attribute to store in Apache logs <em>(“General Parameters » Logs » REMOTE_USER”)</em>: use the variable declared above</div>
</li>
</ul>
</div>
<!-- EDIT2 SECTION "Authentication with login/password" [58-494] -->
<h2class="sectionedit3"id="authentication_with_kerberos">Authentication with Kerberos</h2>
<liclass="level1"><divclass="li"><ahref="authapache.html"class="wikilink1"title="documentation:2.0:authapache">Configure the Apache server</a> that host the portal to use the Apache Kerberos authentication module</div>
</li>
</ul>
</div>
<!-- EDIT3 SECTION "Authentication with Kerberos" [495-] --></div>
Applications listed below are known to be easy to integrate in <abbrtitle="LemonLDAP::NG">LL::NG</abbr>. As <abbrtitle="LemonLDAP::NG">LL::NG</abbr> works like classic WebSSO (like Siteminder™), many other applications are easy to integrate.
<thclass="col0 centeralign"colspan="3"> Some applications using it </th>
</tr>
<trclass="row3 rowodd">
<tdclass="col0 centeralign"><ahref="http://en.wikipedia.org/wiki/Outlook_Web_App"class="urlextern"title="http://en.wikipedia.org/wiki/Outlook_Web_App"rel="nofollow">Outlook Web App</a><br/>
<divclass="noteclassic">This requires to configure <abbrtitle="LemonLDAP::NG">LL::NG</abbr> as an <ahref="idpsaml.html"class="wikilink1"title="documentation:2.0:idpsaml">SAML Identity Provider</a>.
<ahref="https://www.alfresco.com/"class="urlextern"title="https://www.alfresco.com/"rel="nofollow">Alfresco</a> is an ECM/BPM software.
</p>
<p>
Since 4.0 release, it offers an easy way to configure <abbrtitle="Single Sign On">SSO</abbr> thanks to authentication subsystems.
</p>
<divclass="noteimportant">If you use an older version, you need to refer to the following documentation: <ahref="https://wiki.alfresco.com/wiki/SSO"class="urlextern"title="https://wiki.alfresco.com/wiki/SSO"rel="nofollow">https://wiki.alfresco.com/wiki/SSO</a>
<divclass="notetip">The official documentation can be found here: <ahref="http://docs.alfresco.com/4.0/tasks/auth-alfrescoexternal-sso.html"class="urlextern"title="http://docs.alfresco.com/4.0/tasks/auth-alfrescoexternal-sso.html"rel="nofollow">http://docs.alfresco.com/4.0/tasks/auth-alfrescoexternal-sso.html</a>
</div>
<p>
You need to find the following files in your Alfresco installation:
Edit then <code>share-config-custom.xml</code> and uncomment the last part. In the <code><endpoint></code>, change <code><connector-id></code> value to <code>alfrescoHeader</code> and change the <code><userHeader></code> value to <code>Auth-User</code>: