LDAP directories
Administration Page | Application/Contract | Syracuse/Collaboration | Class | ldaps | Representation | ldap |
---|
When starting the application, users are granted access, or not, depending on their identity. There are four types of authentications:
This page describes the LDAP authentication settings.
The user enters a login and password in the application login screen:
This section provides relevant information about the connection to the LDAP authentication server.
Name used to reference the LDAP setup.
User-friendly description.
If the check box is cleared, the server is considered as inactive, and no login is possible using this setup.
Defines the LDAP server name, port, and protocol (example: "ldap://vil-ldap:3268").
Distinguished name of an LDAP user who has the rights to search the LDAP tree. All other rights should be disabled for this user as it is more "public" than other users.
Note: Anonymous binding is not supported.
Password for the search user defined in DN for searching.
Defines the root of the subtree within the LDAP structure in which the search will be performed.
Defines the search filter.
CA certificates to set up if the LDAP server uses an SSL certificate of a well-known certificate authority (CA).
This section defines the mapping LDAP attributes if you want to import users from LDAP.
Contains the name of the LDAP attribute corresponding to the authentication name property (and in most cases, the login name) of the user entity. Set this field with an existing LDAP attribute. When you use Active Directory, the value is usually "sAMAccountName". You can select the value from a list of LDAP attributes which is obtained from LDAP during runtime. To do so, the fields of the LDAP server have to be already saved in the database. You can also directly enter another LDAP attribute, or even a name that is not on the list.
Contains the name of the LDAP attribute corresponding to the first name property of the user entity. You can select an attribute from the list for the authentication name mapping. The value is usually "firstName".
Contains the name of the LDAP attribute corresponding to the last name property of the user entity. You can select an attribute from the list for the authentication name mapping. The value is usually "sn".
Contains the name of the LDAP attribute corresponding to the email property of the user entity. You can select an attribute from the list for the authentication name mapping. The value is usually "mail".
Contains the name of the LDAP attribute corresponding to the photo properties of the user entity. You can select an attribute from the list for the authentication name mapping. When you use Active Directory, the value is usually "thumbnailPhoto".
Contains the name of the LDAP attribute corresponding to the group membership property of the user entity. The value is usually "memberOf". The link between X3 groups and LDAP groups is made in the group settings.
This section allows you to define search criteria for LDAP users. LDAP has strong search capabilities built in to the server.
LDAP filters consist of one or more criteria. If at least two criteria exist in a filter definition, they can be concatenated by logical operators "AND" and "OR". These operators are always placed between two criteria.
Refer to this page for more information on filters.
Defines a custom search filter for importing user data from the LDAP.
Adds a complementary filter in order to select only LDAP users belonging to LDAP groups linked to X3 groups. The link between X3 groups and LDAP groups is made in the group settings.
Read-only field that displays the final query (in the LDAP filter syntax) that will be sent to the LDAP server in order to select the user entity.
This section defines the LDAP group settings.
LDAP filter that identifies the group's entities on the LDAP tree.
The group search filter is only used for helping to link X3 groups with LDAP groups (LDAP group name lookup). It is not related to the synchronization of users.
Example: "(objectClass=group)"
Contains the name of the LDAP attribute corresponding to the group identification property used to identify group memberships on the user entity. Refer to Mapping for group membership.
This section defines the LDAP syncronization settings.
Defines the default user's authentication policy. Imported users inherit this setting.
If you chose "Standard" authentication, make sure you have a valid policy setting different than "Basic" in the global settings:
This service tries to connect to the LDAP server using the entered authentication data and then disconnects from the LDAP server. Any errors during this process (e. g. wrong password) will be shown.
An LDAP server contains more information about users than necessary for authentication. User data can be imported from an LDAP server into a user entity.
As attribute names in LDAP and in the user entity are different, you have to enter:
To run this function, the current LDAP entry must be active, and you must have write access to the user data. If this is the case, the program performs the following:
Once all users have been managed, all error messages are displayed.
The Scheduler function (Administration > Usage > Automate > Scheduler) allows the selection of a scheduler to automate the process.