Configure the Connection to LDAP
Map the AAA Server to your LDAP directory schema. Consider the following three options before you map the AAA Server to your LDAP directory schema:
- Option 1: Select a field that already exists in the LDAP schema that you are using, and match it to its counterpart in the AAA Server (same or similar field name).
- Option 2: Add a new LDAP field to accommodate the AAA Server authentication attribute that does not exist in your current LDAP schema.
- Option 3: Assign an existing, available (yet differently named LDAP attribute) to a AAA Server field (for example, map the LDAP attribute facsimiletelephonenumber to the AAA Server attribute “Device Serial Number”). However, this option prevents you from modifying or extending your LDAP schema later.
- Access the Administration Console.
- Select Tools, and then click Options. The AAA Server Administration Console Options window is displayed:
- In the Directory Type section of the screen, specify the type of LDAP directory you are using.
- If you select Microsoft Active Directory in the Directory type section of the screen, then the Do not work with disabled Account option becomes available.
Select this option to prevent users whose accounts you have disabled in LDAP from authenticating through the AAA Server.
- Use the Connections settings section to define your LDAP connection settings and test them.
Setting Description Host Enter the IP address or hostname of the server where your LDAP directory resides. If you are using multiple LDAPs, then separate the server identifiers by a space. Port Enter the LDAP directory server’s listening port (the default value is 389). Alt Settings (Active Directory deployments only) Select a specific LDAP directory for “LDAP write operations” performed in the Administration Console. See Configure the LDAP Settings for Write Access. LDAPS
connectionSelect the option to connect to the LDAP via SSL.
LDAPS with Multiple Domains: LDAPS will not work for multiple peer domains in the same forest, nor will it work for multiple domains in different forests.
CA certificate file path for LDAPS Browse to the exported root certificate (a .cer file in base64 format) of the certificate authority that issued the server certificate installed in your directory and used to access your LDAP. Note: The CN attribute in the certificate must match exactly the "Host" defined above. For example, if the host name CN in the certificate is "host.company.com", then the Host defined above must also be "host.company.com".
Important:
- This certificate must be imported into the AAA Server's Trusted Root Certification Authorities store, as well as any server which will initiate LDAPS communication with the directory server on behalf of AAA Server (for example, if the SKI Connector is running on a separate server, the certificate should also be chainable to root on that server).
- You must also configure the same certificate in the AAA Server (see Configure the ActivID AAA Server) and SKI Connector (see Configure the SKI Connector).
Login DN Enter the connection name for AAA Server used to authenticate to the LDAP directory (only if you have a protected directory). This user must have write permission to be able to store the device serial numbers in the directory. Password Enter the password for the Login DN.
Note: The maximum password length is 24 characters.LDAP Referrals Settings (Active Directory deployments only) Select this option to configure referrals to other LDAP directories. See Configure LDAP Referrals. -
In the Users section, in the LDAP user root field, enter the location, in standard LDAP syntax, for the existing LDAP users (for example, ou=employees). If you do not know the location, click Search to display your LDAP tree.
Note: LDAPS does not work for multiple peer domains in the same forest, nor for multiple domains in different forests.Note: The AAA Server Administration database communicates with your LDAP server via LDAP queries for groups of users.
You must create groups in the AAA Server Administration Console. The Administration Console creates these groups based on your LDAP architecture.
The AAA Server groups can be the same groups as you already have created in your LDAP, or they can be a mix of what you already have, plus new attributes. (Remember that when you use the AAA Server, you continue to manage your users in your LDAP directory.) - Use the LDAP groups section to define LDAP groups and test them. You can accept the default values, or change them according to your company’s current LDAP directory and your company’s organizational structure. Use of this functionality assumes knowledge of the fundamentals of LDAP user management.
-
Use the Attributes section to:
- Define which LDAP field you intend to use for entering authentication device serial numbers. By default, this is the facsimiletelephonenumber field.
- Define which field you intend to use for entering user authentication login names (User IDs). The value for this LDAP field must be unique for each directory user to ensure that each User ID is unique.
You can configure a different LDAP for write operations and for read operations (see Configure the LDAP Settings for Write Access).
Important: If you intend to use the Active Directory Global Catalog for read operations, then make sure that the attributes in which you choose to store the device serial number is also synchronized with the global catalog. For further information, see the product documentation provided with the Active Directory. - Click OK.