Search Results

All Results 7006
ソート
Resource Type
Applicable Versions
Deployment Approach
Capability
Feature
Using Liferay Connector to OAuth EE
What is OAuth? It is a utility that authorizes third party applications to interact with the Liferay platform. The example from our official documentation is worth repeating here; users can make Twitter or Facebook...
Using the Data Migration Tool in Liferay Portal
This article describes the two uses of the data migration tool in the system administration section of Liferay Portal. The Data Migration Tool is fully supported for Liferay Portal 6.2...
Updating Plugins After Applying a Patch
This article documents several possible solutions for updating plugins after a new fix pack has been installed. Specifically, customers have found that a plugin's libraries are not patched at the same time as the...
LDAP Import Rejects Users From Certain Domains
This article explains why users from specific domains are not imported through LDAP due to the email address validator in the Liferay platform, and provides a solution to resolve this if a specific domain is required...
Creating Custom Validation Scripts on Web Form Portlet With DXP 7.0
This article documents how to use the custom validation script feature in the Web Form Portlet on Liferay DXP 7.0. Users might have used the same feature on Liferay Portal 6.2 and wonder which features are the same and...
Configuring Liferay DXP as SP and OKTA as IdP
This article documents the basic steps users need to execute in order to set up their instance of Liferay DXP as SP, and OKTA as IdP. Resolution OKTA Configuration Log in to OKTA and navigate to Admin > Add Application...
Changes in MVCActionCommands and portletIds
This article documents changes to the MVCActionCommand type of commands after Liferay DXP 7.0 Fix Pack 11 is deployed. This change most affects developers building portlets in Liferay IDE tools (e.g. Liferay Developer...
Hiding Sensitive Server Details on the License Page
This article documents how to hide sensitive server details, such as the IP Addresses or MAC Addresses, when an administrator deploys an invalid activation key. This poses a security risk because the information is in...