Pages enfant
  • Documentation esup-activ v1 (archive)

Vous regardez une version antérieure (v. /wiki/pages/viewpage.action?pageId=24510468) de cette page.

afficher les différences afficher l'historique de la page

« Afficher la version précédente Vous regardez la version actuelle de cette page. (v. 9) afficher la version suivante »

Esup Activaccount Portlet - Installation Guide


 
Auteur : Fabrice Jammes, Sang Hun Bang (University of Paris 1)

Important note


Due to some limitations using AJAX in esup-commons portlet, this tools can only be used in servlet mode. This isn't a big problem
because this tool is only used by anonymous users who wish to activate their LDAP account.

Installation

esup-activation relies on esup-commons, so it can be installed as an described in esup-commons documentation : http://sourcesup.cru.fr/esup-commons/admin/index.html


  • Download esup-activaccount-<version>.zip from the projectsite
  • Unzip the file somewhere on a working directory

    To configure this application you have to adapt some configuration files. Every time you will find a <fileName>-example.<extension> example file that you can copy to <fileName>.<extension> before adapting.

  • Adapt build.properties
  • Adapt properties/config.properties for exception handling configuration, SMTP configuration

    esup-activaccount doesn't use any database.

  • Test your configuration:
    • ant test-config
    • ant test-smtp
    • ant test-ldap
  • Deploy the application:
    • ant deploy
  • You can modify application look by updating esup-activ/webapp/media/portlet.css

Configuration


You can configure your application. For this: adapt file properties/esup-activ.properties directory and use ant deploy to deploy again your application.

How does it work ?

esup-activ offers a web interface which allow to the members of your institutions to activate their LDAP account online.

LDAP account must have been created previously with another script. For example a PERL script can export accounts from your
human ressources database to LDAP directory every night. Benoît Branciard (Benoit dot Branciard arobase univ-paris1 dot fr) has written
it for Paris 1 University.
These account are created with a null LDAP attribute shadowLastChange et a pre-defined LDAP password

  • Aucune étiquette