Below you find the QPCONFIG.XML which I used at a customer site to connect Lotus Quickr (Domino Services) to an Active Directory LDAP source for authentication.

Although this configuration worked in my environment you might need to adapt some parts to fit in your environment (especially some of the LDAP attributes used). You easily can check what attributes are used in your environment with a freeware tool called “Softerra Ldap Browser“.

[codesyntax lang=”xml” title=”qpconfig.xml”]

[/codesyntax]

 

In addition to the above configuration you need to add the root point of your LDAP tree (see above) in corresponding field in the Quickr Site Administration:

Quickr Directoiry Config

You also need to do some work to get the Quickr offline capability working with Active Directory. I will describe how to do this in a later post.

Update:

David Byrd has just published a very good article in the Quickr wiki regarding AD integration.

Connect Lotus Quickr to LDAP based on Active Directory
Tagged on:     

6 thoughts on “Connect Lotus Quickr to LDAP based on Active Directory

  • 14.05.2008 at 16:11
    Permalink

    Michael,

    Thanks for the great detail of this post. I have been struggling to learn LDAP just to get Quickr going, and this qpconfig.xml example has gone a long way toward helping me get it working.

    Does this qpconfig.xml allow your users to login with their shortname (sAMAccountName)? I cannot get that to work, yet to me it looks like you’ve set it up that way.

    I’m forced to login with my full name.

    Cheers,

    bu11frogg

    Reply
  • 07.09.2009 at 13:11
    Permalink

    Same question :

    Does this qpconfig.xml allow your users to login with their shortname (sAMAccountName)? I cannot get that to work, yet to me it looks like you’ve set it up that way.

    Thank you

    Reply
  • 07.09.2009 at 20:26
    Permalink

    Yes. Normally it should allow you to login with that attribute. See the CDATA parameter in the authentication section which tells Quickr to use either the attribute “sAMAccountName” or “cn” as login attribute.

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *