How to manage LDAP/AD servers
- 3 minutes to read
- Print
- DarkLight
- PDF
How to manage LDAP/AD servers
- 3 minutes to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
senhasegura allows you to use Active Directory (AD) for identity management. If you want to use AD with senhasegura, follow the steps below.
Register an LDAP/AD server
- On senhasegura, in the navigation bar, hover over the Products menu and select Settings.
- In the side menu, select Provisioning > Active directory > Servers.
- In the Servers form, click the Add button.
- In the Servers screen, fill in the fields below:
- In the Domain, device and credential tab:
- Domain: enter the domain for the LDAP server.
- You can add more damons by clickin the Add button. This will open the Domain modal with the Domain and Short name files do fill.
- Credential for authentication: select the credential that will be used to authenticate.
- Click Continue.
- Domain: enter the domain for the LDAP server.
- In the LDAP tab:
- Host: enter the address of the LDAP host.
- Port: enter the port of the LDAP host.
- Enabled: indicate whether the server is active or not. By default, this option is set to Yes.
- Credential for authentication: select the credential that will be used to authenticate to the LDAP server from the drop-down menu.
- Network connector: select from the drop-down menu which connector will be used with the LDAP server.
- DN base: enter the starting location of the directory from which the search or operation will begin. This will be the starting point for searching, adding, modifying, or deleting objects on the LDAP server.
- Account form: select the type of account form from the drop-down menu. The options are: DN, Username, Backslash, and Main.
- Account filter format: specify the search criteria to narrow down the results. For example:
(&(objectClass=user)(sAMAccountName=johndoe))
.- In this case, the fields are:
objectClass=user
: the type of the object must beuser
.sAMAccountName=johndoe
: the user's SAM (Security Account Manager) account name must bejohndoe
.
- In this case, the fields are:
- Account domain: specify the domain of the account. For example,
[email protected]
. - Account domain (Short Name): enter the account's short name, specifically. For example:
SENHASEGURA\johndoe
. - Use Credential Domain: indicate whether you want to use a domain credential. By default this option is set to No.
- Username attribute: enter the account's unique username.
- DN Bind (leave blank to use the DN base): enter the DN that will be used as the unique identifier. For example**:**
"CN=John Doe,OU=Users,DC=senhasegura,DC=com".
- Member is DN?: select Yes if the user is identified by their DN
- Bind requires DN?: select Yes if the bind process needs to use DN.
- Group: enter the account group.
- Group DN: enter the account's DN.
- Group Attribute (GroupAttr): enter the attributes of the group.
- Group scope: enter the group scope.
- Group filter: enter a filter expression for the group. For example:
(objectClass=group)
which will return all objects within the LDAP/AD server that are of typegroup
. - Member attribute (MemberAttr): enter the attributes of the group members.
- Order:
- Use SSL?: select whether you want to use the SSL protocol. By default this option is set to No.
- Click Continue.
- Review and save it.
Edit an LDAP/AD server
- On senhasegura, in the navigation bar, hover over the Products menu and select Settings.
- In the side menu, select Provisioning > Active directory > Servers.
- In the Servers report, select the server you want to edit, click the Actions button and select Edit.
The Server screen will open in edit mode and you can modify the necessary attributes. Then click Save to save the changes.
Test the authentication of an LDAP/AD server
- On senhasegura, in the navigation bar, hover over the Products menu and select Settings.
- In the side menu, select Provisioning > Active directory > Servers.
- In the Servers report, select the server you want to edit, click the Actions button and select Test authentication.
- In the LDAP authentication test screen, fill in the following fields:
- Base DN: fill in the Base DN value. For example:
CN=Users,DC=safe password,DC=com,DC=br
. - User: fill in the username. For example:
johndoe.
- Password: fill in the user's password.
- Click Authenticate.
A message will appear below the fields indicating whether authentication succeeded or failed.
Do you still have questions? Reach out to the senhasegura Community.
Was this article helpful?