Search Results

All Results 597
Resource Type
Applicable Versions
Deployment Approach
Capability
Feature
SessionTracker in clustered environment
Issue Session Tracker cannot be used to track visited paths among cluster nodes. Environment Clustered environment with two or more nodes. Resolution Session Tracker doesn't support tracking visited paths when...
Patching Tool 'support-info' command
Issue Trying to run the 'support-info' command using the patching tool, but nothing happens. But there is no output, and there is no error. How can users find out about modules? Environment Liferay DXP Patching...
Allow custom site administrator role to see all users of Liferay
Issue When creating a site role that is able to add members to a site, they see a limited amount of users or just themselves.  Environment DXP 7.0+ Resolution In order to allow a user to see all members of Liferay, you...
User unable to Login with CSRF error
Issue User is unable to login, and gets the below error in logs: User 0 did not provide a valid CSRF token for com.liferay.portlet.SecurityPortletContainerWrapper Environment Liferay DXP 7.3 Resolution Firstly,...
Create a custom logout action
Issue I want to control what happens after a user logs out.    Environment DXP 7.0+ Resolution There are two ways of achieving the desired outcome. The first is to create a custom module and add it to the list of...
I cannot download the vCard from another user
Issue The Contacts Center Widget allows users to export the user’s vCard and save it as a VCF file. vCard is a file format standard for electronic business cards. If a regular user clicks on the vCard from...
Users can't be assigned to sites
Issue java.lang.IllegalArgumentException is occured when trying to add a user to a site. Steps to reproduce: 1. Add below property in portal-ext.properties file.   users.search.with.index=false 2. Start the...
Impersonation Security concerns
Issue Impersonation is a powerful feature of Liferay. This article serves to answer the following questions regarding its security.  Who triggers the impersonation request? How long that kind of access will be used?...