Search Results

All Results 6986
Resource Type
Applicable Versions
Deployment Approach
Capability
Feature
Requesting a New Feature or Feature Improvement
As an open-source company, Liferay has always highly valued feedback and suggestions from our community of users on how to continually improve our products. Creating and Upvoting...
Disabling Email Notifications With the Blogs Portlet
There may be instances in which an administrator would like to disable the ability for the creator of blog entries to receive email notifications when an entry is added or updated, or...
Adding Custom Password Reminder Questions
This article provides step-by-step instructions on how Liferay Portal, or Liferay Digital Enterprise 7.0, administrators can enable and leverage the user reminder queries. In addition, this article also documents how...
Changing the Page Title in DXP 7.x
By default, the page title in Liferay Digital Experience Platform 7.x displays in the format of Page Name - (Site Name) -  Portal Name. This article documents how to change the portal name so that all page titles contain...
Can I Create a Remote Live Database from a Copy of the Staging Database?
This article documents Liferay's position on duplicating a database to create a staging environment. The Use Case In order to enable Remote Live Staging, system administrators must have two databases: a staged...
Document Library Permissions Are Not Inherited Between Parent and Child Folders/Files
This article describes the behavior in which permissions do not propagate from the parent folders to the files or children folders uploaded in the Document Library. Also, this article...
Updating Plugins After Applying a Patch
This article documents several possible solutions for updating plugins after a new fix pack has been installed. Specifically, customers have found that a plugin's libraries are not patched at the same time as the...
Hiding Sensitive Server Details on the License Page
This article documents how to hide sensitive server details, such as the IP Addresses or MAC Addresses, when an administrator deploys an invalid activation key. This poses a security risk because the information is in...