SystemUser Interface: LDAP Authentication

The following are the options for an LDAP authentication configuration.

Note: If you are configuring a multi-site deploymentClosed A configuration of a Loftware environment that includes Loftware instances located at different sites within the same WAN. In a multi-site deployment, each Loftware instance acts as either a headquarters or a facility. of Loftware Enterprise SP, you must sign in to each facility site to configure LDAP or Azure authentication. LDAP or Azure authentication information is not synced from headquarters to facilities.

Tip: By default, LDAP communication between a client application and a server application is not encrypted. However, you can secure LDAP communication by using LDAP over SSL (LDAPS). To use LDAPS with Loftware Enterprise SP, obtain a copy of your SSL certificate from your LDAP server and import the certificate into the Java certificate keystore on the Loftware Application Server (the certificate must be configured for your environment — LDAPS does not function with the Loftware Enterprise SP self-signed certificate). To locate the Java certificate keystore, open the server.xml file in <LOFTWARE_HOME>/product/conf and find the "keystoreFile" keyword. The java "keytool" utility is used to add the certificate to this file. For more information, see Importing the LDAP Server's Certificate. StartTLS and Simple Authentication and Security Layer (SASL) are not supported.

LDAP Authentication

Option Description Notes
Domain Name A unique name for the LDAP server configuration that identifies the domain represented.

Required. This value is not required to be a real domain.

Provider URL

The LDAP URL to be used by Loftware Enterprise SP when establishing a connection to the LDAP server to authenticate.

Required. Either LDAP or LDAP over SSL (LDAPS) may be used. The URL can include lowercase alphanumeric characters only.

Note: If including a base distinguished name (DNClosed Distinguished name. A unique entry in a directory managed using Lightweight Directory Access Protocol (LDAP).) in the Provider URL, do not end the URL with a slash. Doing so may cause authentication to fail.

Example: LDAP over SSL (LDAPS)

The format is ldaps://host:port/base_dn. The default port is 636.

ldaps://corpldap.example.com:636/dc=company,dc=com

Example: LDAP

The format is ldap://host:port/base_dn. The default port is 389.

ldap://corpldap.example.com:389/dc=company,dc=com

Synchronize

Turn synchronization on or off.

For more information, see Select Objects to Sync.

Admin DN The fully-qualified distinguished name of an administrator account with the authority to search for a user distinguished name.

May be required depending on your configuration. Consult your LDAP system administrator.

Example

cn=directory manager,dc=example,dc=com

Admin Password

The password associated with the account provided in the Admin DN field.

 

May be required depending on your configuration. Consult your LDAP system administrator.

Example

userPassword

Authentication Type The approach used when authenticating with an LDAP server.

You must select one of the following values:

  • Search and Bind: Use the Search Base and Search Filter to find the user distinguished name (DN), and then attempt to bind with the user DN and password.
  • Search and Compare: Use the Search Base and Search Filter to find the user DN, and then attempt to use the LDAP Compare operation with the Password Attribute.
  • Bind Only: Attempt to bind with the user DN and password by using the User DN Patterns.
  • Compare Only: Attempt to use the LDAP Compare operation with the Password Attribute and the User DN Patterns.
Search Base

The portion of the LDAP hierarchy to be searched.

Used if the Authentication Type is Search and Bind or Search and Compare.

Note: You can specify a Search Base, a base DN that is part of the Provider URL, or both. If both, the base DN is appended to the Search Base when the Search Base is evaluated.

Example

ou=shipping,ou=users

Search Filter

An LDAP filter string used in conjunction with the Search Base to perform a search for the user distinguished name before authentication is attempted.

Required if the Authentication Type is Search and Bind or Search and Compare.

The following placeholders can be incorporated. Each placeholder corresponds to a field on the User Info tab for a user as shown in Access Control Access Control.

Placeholder User Info field
{0} User Name
{1} First Name
{2} Last Name
{3} Domain
{4} Email Address

Important! The search filter must be configured to return only one user DN. If the search returns multiple users, authentication fails.

Example: OpenLDAP

The following search filter is for the specified user name.

(uid={0})

Example: Active Directory

The following search filter is for the specified user name.

(sAMAccountName={0})

Example: Name

The following search filter is for the first name and last name of the user as specified in Loftware Enterprise SP.

(cn={1} {2})

Example: Email Address

The following search filter is for the email address of the user as specified in Loftware Enterprise SP.

userPrincipalName={4}

Example: User Name and Domain

The following search filter is for the user name and domain as specified for the user in Loftware Enterprise SP.

(userPrincipalName={0}@{3})

Password Attribute The name of the attribute in the user object in the LDAP server that contains the user password. The password must be SHA encrypted.

Used if the Authentication Type is Search and Compare or Compare Only.

Example

userPassword

User DN Patterns

User distinguished name patterns to be used.

 

Search and bind - used not req

Search and compare - used not req

bind only - req

compare only - req

 

Required if the Authentication Type is Bind Only or Compare Only.

If you enter multiple patterns, they are searched in the order that they appear in this field. Editing a User DN Pattern moves it to the end of the list.

Note: If a base DN is specified in the Provider URL, it is appended to each User DN Pattern when the pattern is evaluated.

Example

{0} is a placeholder for the specified user name.

uid={0},ou=users

Auto Provisioning

Option Description Notes
Enable Auto Provisioning

: When disabled, Loftware Enterprise SP users must be created manually in Access Control Access Control. Any previously created auto-provisioned users and group memberships in Loftware Enterprise SP will not be dynamically updated but will continue to work as defined before auto-provisioning was turned off. (Default)

: When enabled, users in your LDAP service who belong to an LDAP group that is mapped to a Loftware group are automatically created when the user signs in to Loftware Enterprise SP, and the user's Loftware group memberships are automatically assigned based on the Loftware-to-LDAP group mappings. If a user already exists in Loftware Enterprise SP, the user's information and group assignments are automatically updated using the Loftware-to-LDAP group mappings every time the user signs in to Loftware Enterprise SP.

When enabled, validation of auto-provisioning fields is required to save any LDAP data.

LDAP Vendor Configuration

Option Description Notes
LDAP Vendor

Select Active Directory, ApacheDS, OpenLDAP, or Other Vendor. When selected, the fields are pre-filled with the default settings for the selected LDAP vendor.

Attributes to define settings related to users and groups vary by LDAP vendor. The LDAP Vendor option makes it easier to configure auto-provisioning as the default settings are auto-filled, but you must modify the settings to match your LDAP configuration.

Username Attribute The correct attribute for username in your LDAP server.

Required.

DN Attribute The correct attribute for distinguished name (DN) in your LDAP server. Required.
UUID Attribute The correct attribute for the UUID in your LDAP server. Required.
UUID Binary? Whether the UUID attribute in your LDAP server stores UUIDs as a string or as a binary value. By default, Loftware Enterprise SP expects the UUID to be a string. Select this check box if your LDAP setup stores UUIDs as a binary value.
Group Object Type The object class used for groups in your LDAP implementation. Required.
Member Attribute The attribute used to indicate group membership.

Required.

Example

In Active Directory, group membership is indicated in the user object. The user's memberOf property contains the groups that the user is a memberOf. In this case, the memberAttribute would be memberOf.

In OpenLdap, group membership is indicated in the group object. The group's member property contains the users that are a member of that group. In this case, the memberAttribute would be member.

User Provisioning

Option Description Notes
User Search Base Where in the LDAP hierarchy to start the search for a matching LDAP user. Required.
User Search Filter

Which user in LDAP to use to create a new Loftware Enterprise SP user. When an LDAP user signs in to Loftware Enterprise SP, they will sign in with a username formatted as username@domainName. The username and the domain name values are used to search for a matching user in LDAP.

Example

If the username used to sign in is msmith@example.com, the search filter may search for matches on just the username or a combination of the username and domainName.

Required.

The following placeholders can be used:

!USERNAME!

!DOMAIN!

Active Directory Example

(sAMAccountName=!USERNAME!)

(userPrincipalName=!USERNAME!@!DOMAIN!)

(email=!USERNAME!@!DOMAIN!)

Create User Folder

The Loftware Enterprise SP folder where auto-provisioned users will be created. This folder must already exist in Loftware Enterprise SP and should not be the root folder.

Required.

Auto-provisioned users do not have to remain in this folder after they are created.

Example

/Loftware/LDAP Users

First Name Attribute

The LDAP user property that should be used to populate the auto provisioned Loftware Enterprise SP user's first name field.

If no value is entered, all auto-provisioned users will be missing a value for first name.

Active Directory Example

givenName

Last Name Attribute

The LDAP user property which should be used to populate the provisioned Loftware Enterprise SP user's last name field.

If no value is entered, all auto-provisioned users in Loftware Enterprise SP will be missing a value for last name.

Active Directory Example

sn

Email

Attribute

The LDAP user property that should be used to populate the auto provisioned Loftware Enterprise SP user's email field.

If no value is entered, all auto-provisioned users in Loftware Enterprise SP will be missing a value for email address.

 

Description

Attribute

The LDAP user property that should be used to populate the auto provisioned Loftware Enterprise SP user's description field.

If no value is entered, all auto-provisioned users in Loftware Enterprise SP will be missing a value for description.

 

Group Membership Provisioning

Option Description Notes

Group Membership

Search Base

Specify where in your LDAP hierarchy the search for user group memberships should begin.

Required.

Group Membership

Search Filter

Specify the search filter for groups.

Required.

Open LDAP Example

(&(memberUid=!USERNAME!) (objectClass=posixGroup))

Loftware Group to LDAP Group Mapping Table

See User Interface: Group Mapping Table.