Configure the Advanced Security Module for Debugging

This section applies only to installations that include Elasticsearch.





    • Assembly Name:


  1. After you complete the previous steps, copy and paste the following code. Replace the sample values with the appropriate values based on their descriptions.

    See the config node

    <config>   
        <pathToGroupService>http:...</pathToGroupService>   
        <domainRemapping>domain=domain.local</domainRemapping>   
        <groupCacheTimeout>5</groupCacheTimeout>   
        <additionalSecurityLevels>0</additionalSecurityLevels>   
        <enableSidSecurity>false</enableSidSecurity>   
        <includeResultSources>*</includeResultSources>   
        <excludeResultSources></excludeResultSources>   
        <impersonateUser>domain\uA=domain\uB</impersonateUser>   
        <debug>false</debug>   
        <userForGroupService>user</userForGroupService>   
        <passForGroupService>password</passForGroupService>
    </config>

  2. Click OK.
Required Description

X

UserNamtiveGroups.asmxBA InsightConnector Framework

http://<url of your SharePoint Central Administration Site>/longitude.connectors/_layouts/15/esc.search.services/usernativegroups.asmx

BA Insight Connectors

SourceDomain1=TargetDomain1&SourceSourceDomain2=TargetDomain2&…

The user from the source domain is treated as if this user was one (1) of the users for from the target domain.

domain=domain.local&corp=corp.local




Connector Framework


false

includeResultSources

The default value is an empty string (that is, no source is excluded).

Use this setting for scenarios where you want to apply security to some, but not all sources.

Specify a list of result sources for which the security transformation is not applied.

Specify your values using a semicolon separated (;) list of names.

For example, specify:

Local SharePoint Sites;CustomSource


T

Enter the domain and user name of a user that you want to impersonate in the search results.

This parameter can contain a string with one (1) user specified. Use the following format:

domain\user

In the first example, the security level for this user is applied to all of the users.

In the second case, if mapping is found for the user name under which the request is performed, the target user security is applied.

false.

X Connector Framework
X