All of the configuration settings for the client/server version of Redactor can be found in the Admin section (http://localhost:9000/admin by default).
Redactor has three different internal groups with varying permission levels: Admin, Supervisor, and User. The Group Settings configuration maps the client’s Active Directory group names to those in Redactor. Any users that are members of the AD groups mapped here will be able to login to Redactor and have access to all features granted by their group permissions.
To map an Active Directory group to a Redactor group:
- Click the dropdown box inside either the Admin Groups, Supervisor Groups, or User Groups.
- The list will expand to display all of the AD group names from the LDAP service.
- Select an AD group name and click the “Add” button to the right
- More than 1 AD group can be mapped to a Redactor Group by repeating the above steps.
- All Redactor Groups must have at least 1 AD group mapped to it before you’re allowed to proceed.
- Important: Make sure you have the AD credentials of a user that’s in the AD group you assigned to Redactor’s “Admin Groups” above. If you don’t, you will NOT be able to access the /admin section to complete setup.
- Click the Save Groups button at the bottom and wait for the server to restart
When the server comes back online, you will be prompted to login. From this point forward, you must login with an AD/LDAP user account that’s a member of one of the Redactor Groups you defined above. If this is the first time you’re setting up this server, you should login with an account that’s in the Admin Groups since they have access to the /admin configuration section.
The hostname (or IP address) and port the Redactor server is listening on. By default, the server can be reached at http://localhost:9000 or http://<hostname>:9000
To enable HTTPS between the server and clients:
- Check the “Enabled” box at the top of the HTTPS panel.
- If desired, change the hostname and port.
- Enter the fully-qualified paths to the locations of the SSL certificate and key files. (e.g. c:\ssl\cert.crt)
Note: It’s wise to keep the HTTP settings enabled, just in case there’s trouble accessing the HTTPS server after setting it up.