Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


LDAP integration allows connecting your instance to LDAP or AD server and using it as a source of the user data. It provides the ability to connect to directory service storing the authentication data, such as usernames, passwords, user home directories used for keeping business and other data, etc. The global objective of the LDAP engine is importing users into the system. And through this, synchronization with various corporate services can be achieved, and one account can be used to authorize in all corporate services, such as email, website, VoIP, and so on.

In this client-server infrastructure scheme, the SimpleOne instance has to be a client connecting to the LDAP server.

Configuring an LDAP connection


Specifying an LDAP server

To configure an LDAP connection, you need to set up in the system first. For this, please complete the steps below:

  1. Navigate to System LDAP → LDAP Servers.
  2. Click New and fill in the fields.
  3. Click Save or Save and Exit to apply changes.

LDAP Server form fields

FieldMandatoryDescription
NameYEnter the server name.
Root DirectoryY

Enter the RDN (relative distinguished name) of the search directory.

Example: dc=simpleone, dc=ru.

ActiveNSelect this checkbox to make the server active or inactive.
UsernameYSpecify the username authenticating the LDAP connection.
PasswordNSpecify the server's password.


Info

If the RDN is not specified, then during the authorization process LDAP server will attempt to reach the server root directory. If the user logging in is not authorized to access this directory, so the authorization process will be interrupted.


Specifying an LDAP URL

Sometimes, customer infrastructure may contain more than one LDAP server, as an example, for fault tolerance. In this case, you may need to specify some particular server used for authorization on the SimpleOne instance.

To perform this, please complete the steps below:

  1. Navigate to System LDAP → LDAP URL.
  2. Click New and fill in the fields.
  3. Click Save or Save and Exit to apply changes.

LDAP URL form fields

FieldMandatoryDescription
URLY

Enter the LDAP URL there. Here's an example:

ldaps://192.168.1.12:363

ActiveNSelect this checkbox to make the URL active or inactive.
OrderNSpecify the order of this URL if there are more than one similar items. In this case, they will be processed in the descending order.
Operational StatusN
  • Ready to connect
  • Connected
  • Disconnected
  • Error.
ServerYSpecify the appropriate LDAP server (choose it from the previously created).


Tip

If you want to establish a secure LDAP connection (LDAP over SSL, LDAPS) via port 636, then you need to provide the SSL-certificate.

For this, please complete the steps below:

  1. Navigate to System
LDAP →
  1. Security → Certificates.
  2. Click New to create a new record
.
  1. ;
  2. Attach your SSL-certificate (.crt or .ca-bundle) file here
by clicking the attachments icon Image Removed.
  1. ;
  2. Click
Save or 
  1.  Save or Save and Exit
 to
  1.  to apply changes.

The form will get information from your certificate and place it into relevant fields.

Otherwise, your LDAP connection will proceed insecurely; generally, port 389 (TCP/UDP) is used in this case.

SSL Certificate form fields

Field

Description

NameSpecify record name.
SubjectCertificate issuing attributes. This field is populated automatically basing on the provided certificate data. For more information about these attributes, check for RFC 5280.
IssuerThe certificate issuer. This field is populated automatically basing on the provided certificate data.
Short descriptionSpecify brief description for the record.
ActiveSelect this checkbox to make this certificate active or inactive.
Valid fromThe date this certificate is valid from. This field is populated automatically basing on the provided certificate data.
Valid toThe date this certificate is valid to. This field is populated automatically basing on the provided certificate data.


LDAP Definition


After you have configured an LDAP server and an LDAP URL and performed all necessary customer infrastructure preparations, then you are ready to arrange an LDAP Definition. This is a formalized query to the Active Directory server containing the following information:

Excerpt Include
Importing using LDAP
Importing using LDAP


LDAP System Properties

Some of the LDAP abilities can be configured on the client-side using the System Properties engine. These properties are listed below.

Property nameTypeDefault valueDescription
user.authorization_when_no_ldap_connectionBooleanTrueEnables authorization if there's no LDAP connection. In this case, locally created credentials are used.
user.ldap_authenticationBooleanTrueEnables or disables LDAP authentication.
user.ldap_autoprovisionBooleanTrueEnables the automatic creation of users in the user table in the case of the user is created in LDAP but not created on the instance. 

LDAP Log


In the case of necessity of any troubleshooting with your LDAP integration, you can check the log messages to find the fault causes.

For example, failed authorization attempts, or authorization policy avoidance attempts, all this information will be displayed here.

In fact, all these messages are written into the Logs (sys_log).

To use LDAP logs, please complete the steps below:

  1. Navigate to System LDAP → LDAP log.
  2. Find the records you need using the Condition Builder, and other filtering tools, such as Show Matching or Filter Out functionality.

LDAP Log form fields

FieldMandatoryDescription
SourceYDisplays the source from where this log record comes from (LDAP Authorization or LDAP Autoprovision, as an example).
MessageNThe log record message text.
LevelY

This field specifies the error level. Available options:

  • Info
  • Error
  • Warning
  • Debug.
UsernameNReference to the user initiated this record creation.


Table of Contents
absoluteUrltrue
classfixedPosition