One of the recommendations from Keycloak, is to limit the access to the master realm, or use the system without it. However, before we do so, you must first ensure that your other realms has an administrator that can manage it. After which, we can safely disable the Master realm and manage our secondary realms using their respective administrative accounts. To do this, we should first login to the master

Extending ACS 6 docker images After you have your ACS 6 local environment running, you’re probably thinking, this is nice, but I want to deploy my favorite amps, like JS console, Alfresco Governance Services (AGS), or even custom developed amps developed with Alfresco SDK.

Loop through a result set, and execute an action on the objects. This example uses

Apr 2018

Evasive Errors

Very Evasive Proxy Error from Nginx and Apache when uploading files that take more than 1 second to upload. However, the problem was not with Proxy Servers, nor the backend application server. The problem came from the router. TL;DR Proxy Error from Nginx, and Apache on large uploads Large file upload breaks; Large file uploads disconnect; File Upload fails if upload > 1000ms or 1 second No true fix, except

Install NPM https://www.npmjs.com/get-npm Start Alfresco Content Services, and Alfresco Process Services. Locally via SDK with default user/pass (admin:admin) #Fill in prompt to generate your project mvn archetype:generate -Dfilter=org.alfresco.maven.archetype: #After Project Generation, navigate into the project folder. chmod 755 run.sh ./run.sh Clone ADF project from github: git clone https://github.com/Alfresco/alfresco-ng2-components Navigate into the project’s demo-shell sub folder: cd alfresco-ng2-components/demo-shell If Alfresco Content Services and Alfresco Process Services is remote, then you must edit the

Issue: Default Administrators identified in Alfresco does not give the user Administrative privileges Troubleshooting: Check that there isn’t any space in your comma delimited list of names. Recommendations: If you are using LDAP sync to synchronize users, an LDAP admin group should be defined, and this group should be nested under the ALFRESCO_ADMINISTRATORS group.