Pages enfant
  • Documentation esup-activ v1 (archive)

Comparaison des versions

Légende

  • Ces lignes ont été ajoutées. Ce mot a été ajouté.
  • Ces lignes ont été supprimées. Ce mot a été supprimé.
  • La mise en forme a été modifiée.
Commentaire: Migrated to Confluence 5.3
Volet
bgColor#F8F7EF

Esup Activaccount Portlet - Installation Guide


 
Auteur : Fabrice Jammes, Sang Hun Bang (University of Paris 1)

Sommaire
minLevel1
indent20px
styledisc

Important note


Due to some limitations using AJAX in esup-commons portlet, this tools can only be used in servlet mode. This isn't a big problem
because this tool is only used by anonymous users who wish to activate their LDAP account.

How does it work ?

esup-activ offers a web interface which allow to the members of your institutions to activate their LDAP account online.

...

Finally, esup-activ updates LDAP attribute shadowLastChange, and LDAP user password.

Installation

esup-activation relies on esup-commons, so it can be installed as an described in esup-commons documentation : http://sourcesup.cru.fr/esup-commons/admin/index.html

...

  • Adapt build.properties
  • Adapt properties/configesup-activ.properties for exception handling configuration, SMTP configuration, LDAP configuration
    Remarque

    esup-activaccount doesn't use any database.

...

  • You can modify application look by updating esup-activ/webapp/media/portlet.css

Configuration


You can configure your application. For this: adapt file properties/esup-activ.properties directory and use ant deploy to deploy again your application.

You must also modify method : org.esupportail.activ.domain.beans.Account.generateInitialPassword().

Bloc de code

    public void generateInitialPassword() {
        /* TODO : input your password generation algorithm here */
        initialPassword = "initialseed#";
        SimpleDateFormat format =
            new SimpleDateFormat("ddMMyyyy");
        initialPassword += format.format(this.birthDate)+"#";
        initialPassword += this.harpegeNumber+"#";
       
        initialPassword += StringTools.cleanAllSpecialChar(this.birthName)+"#";
       
    }

Here you must implement your algorithm of generation of initial password. It must be the same that the one implemented in the script
used to create nightly LDAP user accounts from human ressources database.

 After ending configuration and conding of your password generation algorithm, use ant deploy to deploy again your application.