{"id":13117,"date":"2019-12-08T08:00:15","date_gmt":"2019-12-08T07:00:15","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/"},"modified":"2019-12-08T08:00:15","modified_gmt":"2019-12-08T07:00:15","slug":"documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/","title":{"rendered":"Documentum &#8211; Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects"},"content":{"rendered":"<p>If you have been working with Documentum, then you probably already created\/configured an LDAP\/LDAPs Server Config Object (or several) so that your users can be globally managed in your organization. There are several compatible LDAP Servers so I will just take one (Sun One\/Netscpae\/iPlanet Directory Server). To create this LDAP\/LDAPs Server Config Object, you probably used Documentum Administrator because it&#8217;s simple and quick to setup, however that&#8217;s not enough for automation. In this blog, I will show and explain the steps needed to configure the same but without any need for DA.<\/p>\n<p>The problem with DA is that it usually does some magic and you cannot always do exactly the same without it. Here, this also applies but to a smaller extent since it is only the SSL part (LDAPs) that needs specific steps. For this, there is a KB created by EMC some years ago (migrated to OpenText): <a href=\"https:\/\/knowledge.opentext.com\/knowledge\/cs.dll\/kcs\/kbarticle\/view\/KB6321243\" target=\"_blank\" rel=\"noopener noreferrer\">KB6321243<\/a>.<\/p>\n<p>Before starting, let&#8217;s setup some parameters that will be used in this blog:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">[dmadmin@content-server-0 ~]$ repo=\"repo01\"\n[dmadmin@content-server-0 ~]$ dm_location_name=\"ldap_chain\"\n[dmadmin@content-server-0 ~]$ file_path=\"$DOCUMENTUM\/dba\/secure\/ldapdb\/${dm_location_name}.pem\"\n[dmadmin@content-server-0 ~]$ ldap_server_name=\"Internal_LDAP\"\n[dmadmin@content-server-0 ~]$ ldap_host=\"ldap.domain.com\"\n[dmadmin@content-server-0 ~]$ ldap_ssl=1 #0 for LDAP, 1 for LDAPs\n[dmadmin@content-server-0 ~]$ ldap_port=636\n[dmadmin@content-server-0 ~]$ location=`if ((${ldap_ssl} == 1)); then echo ${dm_location_name}; else echo \"ldapcertdb_loc\"; fi`\n[dmadmin@content-server-0 ~]$ ldap_principal=\"ou=APP,ou=applications,ou=intranet,dc=dbi services,dc=com\"\n[dmadmin@content-server-0 ~]$ ldap_pwd=\"T3stP4ssw0rd\"\n[dmadmin@content-server-0 ~]$ ldap_user_filter=\"objectclass=person\"\n[dmadmin@content-server-0 ~]$ ldap_user_class=\"person\"\n[dmadmin@content-server-0 ~]$ ldap_group_filter=\"objectclass=groupofuniquenames\"\n[dmadmin@content-server-0 ~]$ ldap_group_class=\"groupofuniquenames\"<\/pre>\n<p>&nbsp;<\/p>\n<h3>1. Preparation steps for LDAPs<\/h3>\n<p>The steps in this section are only needed in case you need to configure SSL communications between your LDAP Server and Documentum. It can be done upfront without any issues. So let&#8217;s start with setting up the environment. Without the use of DA, the only way you have to import\/trust SSL Certificate for the LDAPs connection is by adding an environment variable named &#8220;<em>DM_LDAP_CERT_FILE<\/em>&#8221; and setting it to &#8220;1&#8221;. This will allow Documentum to use certificate files for the trust chain instead of doing what DA is doing (the magic part) that we cannot replicate.<\/p>\n<p>It is a little bit out of scope for this blog but a second variable is often needed &#8220;<em>DM_LDAP_IGNORE_HOSTNAME_CHECK<\/em>&#8221; which drives the validation of the hostname. Setting this to &#8220;1&#8221; will disable the hostname check and therefore allow you to use an LDAP Server that is behind a Proxy or a Load Balancer. This would also be needed with a LDAP (non-secure).<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1; highlight: [2,3,13,14]\">[dmadmin@content-server-0 ~]$ grep DM_LDAP ~\/.bash_profile\n[dmadmin@content-server-0 ~]$ echo $DM_LDAP_CERT_FILE -- $DM_LDAP_IGNORE_HOSTNAME_CHECK\n--\n[dmadmin@content-server-0 ~]$\n[dmadmin@content-server-0 ~]$ echo \"export DM_LDAP_CERT_FILE=1\" &gt;&gt; ~\/.bash_profile\n[dmadmin@content-server-0 ~]$ echo \"export DM_LDAP_IGNORE_HOSTNAME_CHECK=1\" &gt;&gt; ~\/.bash_profile\n[dmadmin@content-server-0 ~]$\n[dmadmin@content-server-0 ~]$ grep DM_LDAP ~\/.bash_profile\nexport DM_LDAP_CERT_FILE=1\nexport DM_LDAP_IGNORE_HOSTNAME_CHECK=1\n[dmadmin@content-server-0 ~]$\n[dmadmin@content-server-0 ~]$ source ~\/.bash_profile\n[dmadmin@content-server-0 ~]$ echo $DM_LDAP_CERT_FILE -- $DM_LDAP_IGNORE_HOSTNAME_CHECK\n1 -- 1\n[dmadmin@content-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>For the variables to take effect, you will need to restart the Repositories. I usually set everything up (LDAPs specific pieces + LDAP steps) and only then restart the repositories so it&#8217;s done once at the very end of the setup.<\/p>\n<p>The next step is then to create\/prepare the Trust Chain. In DA, you can import the Trust Chain one certificate at a time, the Root first and then the Intermediate one. While using &#8220;<em>DM_LDAP_CERT_FILE=1<\/em>&#8221; (so without DA), you can unfortunately use only one file per LDAP and therefore this file will need to contain the full Trust Chain. To do that, simply put in a file the content of both Root and Intermediate SSL Certificates one after the other. So in the end, you file should contain something like that:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1; highlight: [2,10]\">[dmadmin@content-server-0 ~]$ vi ${dm_location_name}.pem\n[dmadmin@content-server-0 ~]$ cat ${dm_location_name}.pem\n-----BEGIN CERTIFICATE-----\n&lt;&lt;&lt;content_of_root_ca&gt;&gt;&gt;\n-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----\n&lt;&lt;&lt;content_of_intermediate_ca&gt;&gt;&gt;\n-----END CERTIFICATE-----\n[dmadmin@content-server-0 ~]$\n[dmadmin@content-server-0 ~]$ mv ${dm_location_name}.pem ${file_path}\n[dmadmin@content-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>Once you have the file, you can put it wherever you want with the name that you want but it absolutely needs to be a &#8220;<em>.pem<\/em>&#8221; extension. You can check <a href=\"https:\/\/www.dbi-services.com\/blog\/documentum-ldap-config-object-certdb_location-has-invalid-value\/\" target=\"_blank\" rel=\"noopener noreferrer\">this blog<\/a>, which explains what happens if this isn&#8217;t the case and what needs to be done to fix it. As you can see above, I choose to put the file where DA is putting them as well.<\/p>\n<p>The last step for this SSL specific part is then to create a &#8220;<em>dm_location<\/em>&#8221; Object that will reference the file that has been created so that the LDAP Server Config Object can use it and trust the target LDAP Server. Contrary to the LDAP Certificate Database Management in DA, which is global to all Repositories (so it needs to be done only one), here you will need to create the &#8220;<em>dm_location<\/em>&#8221; Object in all the Repositories that are going to use the LDAP Server. This can be done very easily via iAPI:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">[dmadmin@content-server-0 ~]$ iapi ${repo} -U${USER} -Pxxx &lt;&lt; EOF\ncreate,c,dm_location\nset,c,l,object_name\n${dm_location_name}\nset,c,l,path_type\nfile\nset,c,l,file_system_path\n${file_path}\nsave,c,l\nexit\nEOF\n\n\n        OpenText Documentum iapi - Interactive API interface\n        Copyright (c) 2018. OpenText Corporation\n        All rights reserved.\n        Client Library Release 16.4.0110.0058\n\nConnecting to Server using docbase repo01\n[DM_SESSION_I_SESSION_START]info:  \"Session 0112d6878000111b started for user dmadmin.\"\n\nConnected to OpenText Documentum Server running Release 16.4.0110.0167  Linux64.Oracle\nSession id is s0\nAPI&gt; ...\n3a12d68780002522\nAPI&gt; SET&gt; ...\nOK\nAPI&gt; SET&gt; ...\nOK\nAPI&gt; SET&gt; ...\nOK\nAPI&gt; ...\nOK\nAPI&gt; Bye\n[dmadmin@content-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>The name of the &#8220;<em>dm_location<\/em>&#8221; Object doesn&#8217;t have to be the same as the name of the Trust Chain file. I&#8217;m just using the same here so it&#8217;s simpler to see the relation between both. These are the only steps that are specific to SSL communications between your LDAP Server and Documentum.<\/p>\n<p>&nbsp;<\/p>\n<h3>2. Global steps for LDAP<\/h3>\n<p>This section applies to all cases. Whether you are trying to setup an LDAP or LDAPs Server, then you will need to create the &#8220;<em>dm_ldap_config<\/em>&#8221; Object and everything else described below. As mentioned previously, I&#8217;m using one type of LDAP Server for this example (value of &#8220;<em>dm_ldap_config.a_application_type<\/em>&#8220;). If you aren&#8217;t very familiar with the settings inside the Repository, then the simplest thing to do to find out which parameters you would need (and the associated values) is simply to create one LDAP Config Object using DA. Once done, just dump it and you can re-use that same configuration in the future.<\/p>\n<p>So let&#8217;s start with creating a sample LDAP Server Config Object:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">[dmadmin@content-server-0 ~]$ iapi ${repo} -U${USER} -Pxxx &lt;&lt; EOF\ncreate,c,dm_ldap_config\nset,c,l,object_name\n${ldap_server_name}\nset,c,l,map_attr[0]\nuser_name\nset,c,l,map_attr[1]\nuser_login_name\nset,c,l,map_attr[2]\nuser_address\nset,c,l,map_attr[3]\ngroup_name\nset,c,l,map_attr[4]\nclient_capability\nset,c,l,map_attr[5]\nuser_xprivileges\nset,c,l,map_attr[6]\ndefault_folder\nset,c,l,map_attr[7]\nworkflow_disabled\nset,c,l,map_val[0]\ndisplayName\nset,c,l,map_val[1]\nuid\nset,c,l,map_val[2]\nmail\nset,c,l,map_val[3]\ncn\nset,c,l,map_val[4]\n2\nset,c,l,map_val[5]\n32\nset,c,l,map_val[6]\n\/Home\/${displayName}\nset,c,l,map_val[7]\nfalse\nset,c,l,map_attr_type[0]\ndm_user\nset,c,l,map_attr_type[1]\ndm_user\nset,c,l,map_attr_type[2]\ndm_user\nset,c,l,map_attr_type[3]\ndm_group\nset,c,l,map_attr_type[4]\ndm_user\nset,c,l,map_attr_type[5]\ndm_user\nset,c,l,map_attr_type[6]\ndm_user\nset,c,l,map_attr_type[7]\ndm_user\nset,c,l,map_val_type[0]\nA\nset,c,l,map_val_type[1]\nA\nset,c,l,map_val_type[2]\nA\nset,c,l,map_val_type[3]\nA\nset,c,l,map_val_type[4]\nV\nset,c,l,map_val_type[5]\nV\nset,c,l,map_val_type[6]\nE\nset,c,l,map_val_type[7]\nV\nset,c,l,ldap_host\n${ldap_host}\nset,c,l,port_number\n${ldap_port}\nset,c,l,person_obj_class\n${ldap_user_class}\nset,c,l,group_obj_class\n${ldap_group_class}\nset,c,l,per_search_base\n${ldap_principal}\nset,c,l,grp_search_base\n${ldap_principal}\nset,c,l,per_search_filter\n${ldap_user_filter}\nset,c,l,grp_search_filter\n${ldap_group_filter}\nset,c,l,bind_dn\n${ldap_principal}\nset,c,l,user_subtype\ndm_user\nset,c,l,deactivate_user_option\nT\nset,c,l,import_mode\ngroups\nset,c,l,bind_type\nbind_by_dn\nset,c,l,ssl_mode\n${ldap_ssl}\nset,c,l,ssl_port\n${ldap_port}\nset,c,l,certdb_location\n${location}\nset,c,l,map_rejection[0]\n2\nset,c,l,map_rejection[1]\n2\nset,c,l,map_rejection[2]\n0\nset,c,l,map_rejection[3]\n2\nset,c,l,map_rejection[4]\n0\nset,c,l,map_rejection[5]\n0\nset,c,l,map_rejection[6]\n2\nset,c,l,map_rejection[7]\n0\nset,c,l,retry_count\n3\nset,c,l,retry_interval\n3\nset,c,l,failover_use_interval\n300\nset,c,l,r_is_public\nF\nset,c,l,a_application_type\nnetscape\nset,c,l,a_full_text\nT\nsave,c,l\nexit\nEOF\n\n\n        OpenText Documentum iapi - Interactive API interface\n        Copyright (c) 2018. OpenText Corporation\n        All rights reserved.\n        Client Library Release 16.4.0110.0058\n\nConnecting to Server using docbase repo01\n[DM_SESSION_I_SESSION_START]info:  \"Session 0112d68780001123 started for user dmadmin.\"\n\nConnected to OpenText Documentum Server running Release 16.4.0110.0167  Linux64.Oracle\nSession id is s0\nAPI&gt; ...\n0812d6878000252c\nAPI&gt; SET&gt; ...\nOK\n...\n...\n...\n[dmadmin@content-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>Once the LDAP Server Config Object has been created, you can register it in the &#8220;<em>dm_server_config<\/em>&#8221; Objects. In our silent scripts, we have using the r_object_id of the object just created so that we are sure it is the correct value but below, for simplification, I&#8217;m using a select to retrieve the r_object_id based on the LDAP Object Name (so make sure it&#8217;s unique if you use the below):<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">[dmadmin@content-server-0 ~]$ iapi ${repo} -U${USER} -Pxxx &lt;&lt; EOF\n?,c,update dm_server_config object set ldap_config_id=(select r_object_id from dm_ldap_config where object_name='${ldap_server_name}')\nexit\nEOF\n\n\n        OpenText Documentum iapi - Interactive API interface\n        Copyright (c) 2018. OpenText Corporation\n        All rights reserved.\n        Client Library Release 16.4.0110.0058\n\nConnecting to Server using docbase repo01\n[DM_SESSION_I_SESSION_START]info:  \"Session 0112d6878000112f started for user dmadmin.\"\n\nConnected to OpenText Documentum Server running Release 16.4.0110.0167  Linux64.Oracle\nSession id is s0\nAPI&gt; objects_updated\n---------------\n              1\n(1 row affected)\n[DM_QUERY_I_NUM_UPDATE]info:  \"1 objects were affected by your UPDATE statement.\"\n\nAPI&gt; Bye\n[dmadmin@content-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>Then, it is time to encrypt the password of the LDAP Account used that is used for the &#8220;<em>bind_dn<\/em>&#8221; (<em>${ldap_principal}<\/em> above):<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1; highlight: [1,4,20]\">[dmadmin@content-server-0 ~]$ crypto_docbase=`grep ^dfc.crypto $DOCUMENTUM_SHARED\/config\/dfc.properties | tail -1 | sed 's,.*=[[:space:]]*,,'`\n[dmadmin@content-server-0 ~]$ \n[dmadmin@content-server-0 ~]$ iapi ${crypto_docbase} -U${USER} -Pxxx &lt;&lt; EOF\nencrypttext,c,${ldap_pwd}\nexit\nEOF\n\n\n        OpenText Documentum iapi - Interactive API interface\n        Copyright (c) 2018. OpenText Corporation\n        All rights reserved.\n        Client Library Release 16.4.0110.0058\n\nConnecting to Server using docbase gr_repo\n[DM_SESSION_I_SESSION_START]info:  \"Session 0112d68880001135 started for user dmadmin.\"\n\nConnected to OpenText Documentum Server running Release 16.4.0110.0167  Linux64.Oracle\nSession id is s0\nAPI&gt; ...\nDM_ENCR_TEXT_V2=AAAAEHQfx8vF52wIC1Lg8KoxAflW\/I7ZnbHwEDJCciKx\/thqFZxAvIFNtpsBl6JSGmI4XKYCCuUl\/NMY7BTsCa2GeIdUebL2LYfA\/nJivzuikqOt::gr_repo\nAPI&gt; Bye\n[dmadmin@content-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>Finally, the only thing left is to create the file &#8220;<em>$DOCUMENTUM\/dba\/config\/${repo}\/ldap_${dm_ldap_config_id}.cnt<\/em>&#8221; and put in it the content of the encrypted password (the whole line &#8220;<em>DM_ENCR_TEXT_V2=&#8230;::gr_repo<\/em>&#8220;). As mentioned previously, after a small restart of the Repository, you should then be able to run your <em>dm_LDAPSynchronization<\/em> job. You might want to configure the job with some specific properties but that&#8217;s up to you.<\/p>\n<p>With all the commands above, you have already a very good basis to automate the creation\/setup of your LDAP\/LDAPs Server without issue. In our automation, instead of printing the result of the iAPI commands to the console, we are usually putting that in a log file. With that, we can automatically retrieve the result of the previous commands and continue the execution based on the outcome so there is no need for any human interaction. In the scope of this blog, it was much more human friendly to display it directly.<\/p>\n<p>Maybe one final note: the above steps are for a Primary Content Server. In case you are trying to do the same thing on a Remote Content Server (RCS\/CFS), then some steps aren&#8217;t needed. For example, you will need to put the Trust Chain to the correct location but you won&#8217;t need to create the &#8220;<em>dm_location<\/em>&#8221; or &#8220;<em>dm_ldap_config<\/em>&#8221; Objects since they are inside the Repository and therefore already present.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you have been working with Documentum, then you probably already created\/configured an LDAP\/LDAPs Server Config Object (or several) so that your users can be globally managed in your organization. There are several compatible LDAP Servers so I will just take one (Sun One\/Netscpae\/iPlanet Directory Server). To create this LDAP\/LDAPs Server Config Object, you probably [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[197,525],"tags":[129,1547,1761,1417,382],"type_dbi":[],"class_list":["post-13117","post","type-post","status-publish","format-standard","hentry","category-application-integration-middleware","category-enterprise-content-management","tag-documentum","tag-ldap","tag-ldaps","tag-silent","tag-ssl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Documentum - Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Documentum - Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects\" \/>\n<meta property=\"og:description\" content=\"If you have been working with Documentum, then you probably already created\/configured an LDAP\/LDAPs Server Config Object (or several) so that your users can be globally managed in your organization. There are several compatible LDAP Servers so I will just take one (Sun One\/Netscpae\/iPlanet Directory Server). To create this LDAP\/LDAPs Server Config Object, you probably [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-08T07:00:15+00:00\" \/>\n<meta name=\"author\" content=\"Morgan Patou\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MorganPatou\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan Patou\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/\"},\"author\":{\"name\":\"Morgan Patou\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"headline\":\"Documentum &#8211; Automatic\\\/Silent creation of LDAP\\\/LDAPs Server Config Objects\",\"datePublished\":\"2019-12-08T07:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/\"},\"wordCount\":1184,\"commentCount\":0,\"keywords\":[\"Documentum\",\"ldap\",\"LDAPs\",\"Silent\",\"SSL\"],\"articleSection\":[\"Application integration &amp; Middleware\",\"Enterprise content management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/\",\"name\":\"Documentum - Automatic\\\/Silent creation of LDAP\\\/LDAPs Server Config Objects - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\"},\"datePublished\":\"2019-12-08T07:00:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Documentum &#8211; Automatic\\\/Silent creation of LDAP\\\/LDAPs Server Config Objects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\",\"name\":\"Morgan Patou\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"caption\":\"Morgan Patou\"},\"description\":\"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\\\/Banking, and the Pharmaceutical industry.\",\"sameAs\":[\"https:\\\/\\\/blog.dbi-services.com\\\/author\\\/morgan-patou\\\/\",\"https:\\\/\\\/x.com\\\/MorganPatou\"],\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/author\\\/morgan-patou\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Documentum - Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/","og_locale":"en_US","og_type":"article","og_title":"Documentum - Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects","og_description":"If you have been working with Documentum, then you probably already created\/configured an LDAP\/LDAPs Server Config Object (or several) so that your users can be globally managed in your organization. There are several compatible LDAP Servers so I will just take one (Sun One\/Netscpae\/iPlanet Directory Server). To create this LDAP\/LDAPs Server Config Object, you probably [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/","og_site_name":"dbi Blog","article_published_time":"2019-12-08T07:00:15+00:00","author":"Morgan Patou","twitter_card":"summary_large_image","twitter_creator":"@MorganPatou","twitter_misc":{"Written by":"Morgan Patou","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/"},"author":{"name":"Morgan Patou","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"headline":"Documentum &#8211; Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects","datePublished":"2019-12-08T07:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/"},"wordCount":1184,"commentCount":0,"keywords":["Documentum","ldap","LDAPs","Silent","SSL"],"articleSection":["Application integration &amp; Middleware","Enterprise content management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/","url":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/","name":"Documentum - Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"datePublished":"2019-12-08T07:00:15+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Documentum &#8211; Automatic\/Silent creation of LDAP\/LDAPs Server Config Objects"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8","name":"Morgan Patou","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","caption":"Morgan Patou"},"description":"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\/Banking, and the Pharmaceutical industry.","sameAs":["https:\/\/blog.dbi-services.com\/author\/morgan-patou\/","https:\/\/x.com\/MorganPatou"],"url":"https:\/\/www.dbi-services.com\/blog\/author\/morgan-patou\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/13117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=13117"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/13117\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=13117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=13117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=13117"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=13117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}