How To Search For An Active Directory On Goprint Ggprint Goprint.Org (Geoprint) (Georgos4) (Goprint) And Gopprint.Org Gop Print.Org
|
|
|
- Adam Barrett
- 5 years ago
- Views:
Transcription
1 Active Directory LDAP Configuration TECHNICAL WHITE PAPER OVERVIEW: GS-4 incorporates the LDAP protocol to access, (and import into a GS-4 database) Active Directory user account information, such as a student s LoginID, FirstName, LastName, or Card Number to dynamically assign print funds. This document begins by providing an overview of LDAP functionality to help you become familiar with its many terms and options. The last section, GS-4 Active Directory Integration, guides you through the step by step process of configuring a GS-4 LDAP profile. If you feel comfortable with the LDAP/Active Directory process, you may skip the informational portion and proceed directly to the GS-4 LDAP profile configuration. What is LDAP Is a directory service protocol that specifies directory communications. It runs directly over TCP/IP, and it can also run over user datagram protocol (UDP) connectionless transports. LDAP enables clients to query, create, update, and delete information that is stored in a directory service over a TCP connection. LDAP is the preferred and most common means of interacting with Active Directory. In Active Directory, directory clients use Lightweight Directory Access Protocol (LDAP) to perform searches against the directory. LDAP is defined by Request for Comments (RFC) 3377, Lightweight Directory Access Protocol (v3): Technical Specification. LDAP is a standards-based protocol that makes it possible for users to query and update information in an LDAP-based directory service, such as Active Directory. To perform Active Directory searches, LDAP-compliant directory clients compose a search query using LDAP syntax and then submit the query to Active Directory for processing. Distinguished Name Every object in Active Directory has a distinguished name (also known as DN). A distinguished name uniquely identifies an object by using the name of the object, plus the names of the container objects and domains that contain the object GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 1
2 Therefore, the distinguished name identifies the object as well as its location in a tree. The distinguished name is unambiguous (that is, it identifies one object only) and unique (that is, no other object in the directory has this name). It contains enough information for an LDAP client to retrieve the object s information from the directory. For example, a user named Jeff Smith is a graduate student in the school of business for a major university. His user account is created in the grads OU that stores the accounts for graduate students. The root domain of the university is goprint.edu, and the local domain is southcampus.goprint.edu. The distinguished name for this user object is: cn=jeff Smith,ou=grads,dc=southcampus,dc=goprint,dc.edu Relative Distinguished Name The relative distinguished name (also known as the RDN) of an object is the part of the distinguished name that is an attribute of the object itself the part of the object name that identifies this object as unique within a container. For the example in the previous paragraph, the relative distinguished name of the user object: cn=jeff Smith,ou=grads,dc=southcampus,dc=goprint,dc=edu is: cn=jeff Smith. The maximum length that is allowed for a relative distinguished name is 255 characters, but attributes have specific limits that are imposed by the directory schema. For example, in the case of the common name (cn), which is the attribute type that is often used for naming the relative distinguished name, the maximum number of characters that is allowed is 64. Searching Active Directory Searching is the most common directory activity. To complete an LDAP search, a directory client must complete a series of steps, as follows: Find an LDAP directory server Establish a connection 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 2
3 Authenticate against (bind to) the LDAP directory server Perform a search FINDING A SERVER The first step that a directory client must take in conducting an Active Directory search is to find an LDAP directory server (in other words, a domain controller) to search against. To find a domain controller, directory clients rely on DNS. When a domain controller starts up, it registers service (SRV) records in DNS that indicate that the domain controller provides LDAP directory services. To locate a domain controller, a directory client performs a DNS query for SRV records of hosts that provide LDAP directory services. ESTABLISHING A CONNECTION After it finds a directory server, a directory client must next connect to the server. A directory client can connect to an LDAP directory server by opening a session on a TCP port number on which the LDAP directory server is listening. The string that is used to establish the connection includes the fully qualified domain name (FQDN) of the LDAP directory server, along with the TCP port number of the directory server. For standard LDAP searches, directory clients connect to TCP port 389. AUTHENTICATING - BINDING After a directory client establishes a communications path to the domain controller, it must bind to the domain controller to establish the logon and authentication credentials and, if necessary for Windows-based computers, set up a secure channel. (A client can also attempt to bind to a domain controller without first establishing a connection.) The bind operation identifies the connecting person, device, or application to the server by providing a distinguished name and some type of authentication credential, such as a password. The exact credentials depend on the authentication method that is being used. LDAP v3 enables the client to negotiate with the LDAP server to determine the best available security package. If no security package is available, the bind is a simple bind that uses a plaintext password. The Microsoft implementation of the LDAP API uses the NEGOTIATE flag so that the client can discover the best security package 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 3
4 that is available. For example, a SASL mechanism, such as Kerberos V5 or NTL, might be used. LDAP BIND REQUEST The bind command initiates a protocol session to the domain controller. After a session is established, a method of authentication is negotiated between the domain controller and the client. By default, Kerberos is used, but other methods can also be used. Finally, the domain controller returns a bind response to the client when the client is authenticated. Note: If a directory client attempts to bind to a directory server without specifying credentials, an anonymous bind is attempted. Active Directory does not accept anonymous binds by default. However, Active Directory can be configured to accept anonymous binds. For more information, see Anonymous queries later in this section. PERFORMING AN LDAP SEARCH LDAP searches are the most common LDAP operations that are performed against an Active Directory domain controller. An LDAP search retrieves information about all objects within a specific scope that have certain characteristics. The following parameters are used in LDAP to accomplish an LDAP search: Search base (the distinguished name of the search base object). Defines the location in the directory from which the LDAP search begins. Search scope. Defines how deep to search within the search base: Base (or zero level). Indicates a search of the base object only. One level. Indicates a search of objects immediately subordinate to the base object but not the base object itself. Subtree. Indicates a search of the base object and the entire subtree of which the base-object distinguished name is the topmost object. Filter. Allows certain entries in the subtree and excludes others. Selection. Indicates what attributes to return from objects that match the filter criteria GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 4
5 Default Active Directory Naming Attributes TECHNICAL WHITE PAPER Object Class Naming Attribute Display Name Naming Attribute LDAP Name User Common-Name cn organizationalunit Organizational-Unit-Name ou domain Domain-Component dc Other naming attributes that are described in RFC 2253, Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names, such as o= for organization name and c= for country/region name, are not used in Active Directory. Common LDAP Search Filters ObjectCategory - defines the Active Directory Schema category. For example, objectclass = Person Objectclass - Defines the database schema, specifying which attributes an entry can, and must, include. objectclass = User. Also used for Computer, organizationalunit, even container. Important top level container, refers to cn, sn,oid objectclass vs. objectcategory in a search filter Sometimes, you might want to search Active Directory for objects of a particular type. For example, you might want to search for Active Directory objects that represent users. You can do this by searching for objects of a particular object class, 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 5
6 using the objectclass attribute (objectclass=user). Or, you can search for objects of a particular category, using the objectcategory attribute (objectcategory=user). Because of the class inheritance hierarchy in the schema, every object in Active Directory is in fact a member of many classes four or five, on average. For this reason, searches that use objectclass can be less accurate than searches that use objectcategory. For example, a search filter of objectclass=user returns both user and computer objects. On the other hand, objectcategory usually refers to the most specific class in the object s class hierarchy. Every Active Directory object has an objectcategory attribute whose value is a classschema object. For example, a search filters of objectcategory=user returns only user objects. Although objectclass can have multiple values, the attribute objectcategory has only one value. Subordinate References When a client requests a search, the domain controller searches all objects at or below the search base in the directory partition that the domain controller holds. If a subtree search has a search base that includes child partitions, the domain controller uses information that is provided by subordinate references to return referrals (called subordinate referrals) to these partitions on other domain controllers. The search base Basic root search Starting a search at the root level of a domain scans the entire directory tree including all subordinate OUs. Using the Active Directory domain goprint.edu the base DN may look like: dc=goprint,dc=edu. Limiting the search To reduce system overhead and to intentionally exclude or include only a specific group of users you can start the search at the OU level. For example, to start your search at the students OU of the goprint.edu domain you might use a search base as 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 6
7 follows: ou=students,dc=goprint,dc=edu. The AdsPath can use either the LDAP or Global Catalog providers. You would use the GC provider to search for information in other trusted domains, but only attributes replicated to the Global Catalog are available. The search filter - A clause that specifies the conditions that must be met for records to be included in the resulting recordset. The attribute values for all objects meeting the conditions are included in the recordset. The syntax of the search filter is explained below. An example to filter for all user objects would be "(&(objectcategory=person)(objectclass=user))" Attributes By default, the following attributes are members of the ANR attribute set, and are used by the GoPrint GS-4 solution: givenname (first name) sn (surname, or last name) displayname (the name that is given to the object when it is created) RDN (the relative distinguished name of the object) mail ( address) GS-4 Active Directory Integration To access the GS-4 Active Directory LDAP profile configuration section select: Accounts Authentication Connectors 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 7
8 Standard Authentication and the Card Swipe Authentication GS-4 provides two connector options, Standard Authentication and Card Swipe Authentication. The card swipe authentication is used when the students Login Id is programmed on a university campus card and is used to release print jobs when swiped at a print release station. Step 1 - Click Add a Standard Authentication Connector Select Microsoft Active Directory: 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 8
9 Step 2 Enter the Server name and Base DN TECHNICAL WHITE PAPER Name: create a user-friendly name to identify the connection type. Active: click Active Server: enter the host name of the Active Directory domain controller Authentication Type: leave default of Simple. To enable SSL authentication the Active Directory schema must be enabled to force secure TLS communication, and the domain SSL certificate must be imported into the GS4\JRE\ keystore. Refer to Advance Topics under the GS-4 HELP section for additional information. SCENARIO 1 ROOT LEVEL SEARCH Example domain: goprint.com Base DN: DC=goprint,DC=com Append Base DN to Users DNs: leaved checked! 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 9
10 Note: Active Directory allows anonymous bind only at the root level. When electing to use any of the Browse options you may receive an error message indicating you must bind before searching is allowed. Step 3 Search and Authentication Method: select Search First, then Authenticate Caution: The Authenticate Only option does not apply to Windows Active Directory and LDAP under GS-4. The sole goal is to search users and return results. Do not attempt to select Authenticate only Search Filter: GS-4 provides and recommends using the following default search filter: (&(objectcategory=person)(objectclass=user)(cn=${user})) Note: you may replace CN=${User} with samaccountname=${user} to return the LoginID instead of the Common Name or Display Name GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 10
11 Search User DN Active Directory requires an authenticated user to perform searching. In the majority of cases, a standard user account has sufficient Read rights to perform a search. Caution: to ensure a successful bind and directory search, it s important to follow the following examples carefully. Option 1 - Authenticated User lies within the Built-in Users container If the authenticated user account is found under the Active Directory built-in Users container, (Hint: the Users container is NOT regarded as an OU) then you are required to reference the Users container with the CN attribute. Example: cn=goprintldap,cn=users ` Option 2 - Search User lies within a specific OU If the search user is located under a specific OU then you must include the OU. In the following example the search user is located in the Library OU Example: cn=goprintldap,ou=library 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 11
12 Step 4 - Attributes GS-4 automatically provides the required attributes you will need to successfully import users: Account ID: use CN or samaccountname Class Name: optional Default Class: specify the User Class (refer to the GS-4 Quota section on applying User Classes) Card Number: optional. Used with 3 rd party transaction systems FirstName: givenname LastName: sn Reference Number: optional Optional Attribute Browser: Clicking the attribute Brower will return the default system attributes. Note: UserPrincipalName attribute is not supported SCENARIO 2 - BASE DN STARTING A SEARCH AT THE OU LEVEL When searching extremely large directory trees, to enhance performance, you may want to begin your search at the OU level. Starting a search at a specific OU also grants you the ability to include only a select member of users, beneficial when it s desired to grant different print quota to a select group of users GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 12
13 In our example, we begin our search at the Library OU: Note: Starting a search at the OU level also searches ALL subordinate subtrees. STEP 1 SET THE BASE DN: OU=LIBRARY,DC=GOPRINT,DC=COM STEP 2- SPECIFY THE AUTHENTICATED USER ACCOUNT Note: When setting a Base DN at the OU level, for easy management, it s recommended to also have the search user account within the same OU GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 13
14 Since the search user account is located in the base OU, (in this example, the library OU) you only need to reference the CN name and not the OU. Example: cn=ldapadmin When the authenticated user account is located in different OU If campus security restrictions require placing the authenticated user in a different OU other than what is specified in your Base DN, then you must initiate the following changes. If your search user is located in a different OU outside your search path, then you MUST: 1. uncheck Append Base DN to Users DNs 2. provide the search user s complete distinguished name In the example the goprintldap user is located under the ITS OU, a subtree of the staff OU. The Search User DN field would appear as: cn=goprintldap,ou=its,ou=staff,dc=goprint,dc.edu 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 14
15 SCENARIO 3 SEARCHING ONLY THE DEFAULT USERS CONTAINER You can also start your Base DN to search only the Default Users container. The trick is, is to reference the Users container using the CN attribute. Example: cn=users,dc=goprint,dc=com This scenario is beneficial if numerous LDAP profiles are desired to enable multiple print quotas based on OU level and the Users container. Testing your LDAP Connection String You can run a connection test using the connector Test utility to ensure your LDAP settings are correct. Click the Test button 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 15
16 Authentication Test Enter a username and password located in the search filter path Click: Test A successful query returns the following results: Troubleshooting Bind and searching Issues Whenever an unsuccessful test result is generated, to troubleshoot, it s important to understand how the search and authenticate process is initiated. The best point of reference is the GS-4 RUN.log file found under \\GS4\Logs. A successful Bind and Search A search attempt first looks for the authenticated user. If successful, the LDAP Auth users Distinguish name is returned as follows: ] LDAP Auth for CN=goprintldap,CN=Users,DC=goprint,DC=com 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 16
17 Once authenticated an attempt is made to find the specific User entered during the test. In this case, a successful attempt was made to find the user Steve under the IT Staff OU :07:28,265 DEBUG [btpool1-4:ldap.ldapconnector ] LDAP Auth for CN=Steve,OU=IT STAFF,DC=goprint,DC=com Failed to find auhenticated user An error code 525 is returned when the account cannot be found. The results could be caused by a number of things: The authenticated user account is not located in the search path Authenticated username may be misspelled DisplayName may be required Incorrect search filter path typos exist Incorrect servername was provided. ] LDAP authentication for CN=goprintldap,cn=Users,DC=goprint,DC=com failed: [LDAP: error code : LdapErr: DSID-0C090334, comment: AcceptSecurityContext error, data 525, vece ] Wrong password provided by authenticated user Incorrect passwords are represented by a 52e error LDAP authentication for CN=goprintldap,CN=Users,DC=goprint,DC=com failed: [LDAP: error code : LdapErr: DSID-0C090334, comment: AcceptSecurityContext error, data 52e, vece ] user not found 52e - invalid credentials 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 17
18 Authenticated user and end-user accounts are found but invalid password was entered by the end-user. Note the 52e error below LDAP Auth for CN=goprintldap,CN=Users,DC=goprint,DC=com User account Fred is found but an error 52e is returned, representing invalid credentials were entered :00:43,609 INFO [btpool1-3:ldap.ldapconnector ] LDAP authentication for CN=fred,CN=Users,DC=goprint,DC=com failed: [LDAP: error code : LdapErr: DSID-0C090334, comment: AcceptSecurityContext error, data 52e, vece ] End user account does not exist LDAP Auth for CN=goprintldap,CN=Users,DC=goprint,DC=com :23:06,562 DEBUG [btpool1-3:authentication.authenticationmanager] Authentication failed: null javax.naming.partialresultexception [Root exception is javax.naming.communicationexception: goprint.com:389 [Root exception is java.net.sockettimeoutexception: connect timed 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 18
19 LDAP Advanced Scenario s Multiple LDAP profiles may be created when necessary to grant different quota amounts based on a user s status such as, credit hours, undergraduate, graduate or department. Note: GS-4 searches the top most profile first and moves downward until a match is established GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 19
20 GS-4 Administrator Users and LDAP Depending on the Base Search filter, you can assign a user to a specific GS-4 Admin Class based on domain group membership using the MemberOf string. Example: (memberof=cn=library,ou=library,dc=goprint,dc=com) 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 20
21 LDAP Group Membership and Print Rules Owner Rule Note: the user name in the Spool file has to match the user name Reference in the memberof string under the specific path String MUST contain reference to: (cn=${user})) Example: (&(memberof=cn=library,ou=library,dc=goprint,dc=com)(cn=${user})) Make sure to assign the Owner Rule to the Base Pricing Section of the Price Sheet 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 21
22 Optionally operators used to refine searches: Operator Description = Equal to ~= Approximately equal to <= Lexicographically less than or equal to >= Lexicographically greater than or equal to & AND OR! NOT The network ports that are used by Active Directory searches are listed in the following table. Port Assignments for Active Directory Searches Service Name UDP TCP LDAP None 389 LDAP SSL None 636 Global Catalog LDAP None 3268 Global Catalog LDAP SSL None GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 22
23 Additional LDAP Resources LDAP Query Policy LDAP v3 supports the definition of client query policy. By default, limits are placed on the server resources that are available to clients requesting LDAP queries, paged result sets, and sorted result sets. These limits constitute the LDAP query policy. The query policy is stored as a multivalue attribute (ldapadminlimits) of the Default Query Policy object in the configuration directory partition (cn=default Query Policy,cn=Query-Policies,cn=Directory Service,cn=Windows NT,cn=Services,cn=Configuration,dc=Forest RootDomain). Because the workload and resources of a given server can vary, the LDAP query policy is configurable at the server level. LDAP query policy applies to the following LDAP query related operations: Search. The basic query operation. An LDAP search might cover a small part of a single domain, or it might span every directory partition in the forest. A search can generate a significant amount of disk activity, take a long time, and return a large volume of data. Search with Paged Results. Because a search can return a large volume of data, the client can ask the server to hold the result set and return it in pages of a specified length. The server must hold the result set until the client releases it or unbinds. Search with Sorted Results. A client can request a result set in a particular order. Sorting requires storage and CPU cycles at the server. The resources consumed are directly proportional to the size of the result set. Search with Replication. The administrator can specify the maximum number of attribute values that can be returned per request. Change Notify. A client can request change notification on particular objects in the directory. The mechanism that is used to post a Change Notify request is the asynchronous LDAP query GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 23
24 In the absence of any other assigned policy, all domain controllers use the default query policy. If a site policy is assigned, the domain controller uses the site policy. If a specific policy has been assigned to a domain controller, this policy takes precedence over any site policy. The following table shows the administrative limits for default query policy. Default Values for LDAP Administrative Limits LDAP Administrative Limits Default Value Description and Search Behavior MaxConnIdleTime 900 Maximum Connection Idle Time. The maximum time (in seconds) that the client is allowed to be idle before the connection is closed. MaxActiveQueries 20 Maximum Active Queries. The maximum number of concurrent search operations allowed on the server. When the stated limit is reached, the LDAP server returns a busy notification. MaxNotificationPerConn 5 Maximum Notifications per Connection. The maximum number of concurrent notification requests allowed per connection on the server. When the stated limit is reached, the server returns a busy notification. MaxPageSize 1000 Maximum Page Size. The largest page size allowed by the server (in number of rows). The server returns the number of rows that are specified by MaxPageSize. If paged results are requested, the client can retrieve additional pages until all results are 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 24
25 returned. MaxQueryDuration 120 Maximum Query Duration. The maximum elapsed time (in seconds) that is allowed for a query to complete. If paged results are requested, the client can continue the query if the timer expires before the query completes. When the stated limit is reached, the server returns the timelimitexceeded error. MaxReceiveBuffer Maximum Receive Buffer. The maximum LDAP request size (in bytes) that the server attempts to process. If the server receives a request that is larger than this value, it closes the connection. MaxTempTableSize Maximum Temporary Table Size. The upper limit (in candidate objects) on the temporary table. If the temporary table maximum limit is reached by an OR query optimization, the optimization is abandoned and replaced with a direct table scan. MaxResultSetSize Maximum Result Set Storage. The maximum storage (in kilobytes (KB)) that the server can hold for all paged result sets. If the stated limit is reached, the oldest result sets are discarded. MaxPoolThreads 4 Per Processor Asynchronous Thread Queue (ATQ) Threads. The number of threads that are allocated by ATQ per processor. This value is sent as an advisory notification to ATQ. ATQ 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 25
26 decides whether to use it or not. Note If it takes a long time to bind, increase the count to 6 or 8. MaxDatagramRecv 1024 Maximum Receive Datagram Size. The maximum size of datagrams (in bytes) that can be received by the server. The server preallocates datagram buffers and cannot receive datagrams with a size that is larger than the stated limit. InitRecvTimeout 120 The maximum time (in seconds) that the server waits for the initial request before the connection is dropped. MaxConnections 5000 The maximum number of concurrent LDAP connections allowed on the server. User Datagram Protocol (UDP) connections do not count toward this limit. If the limit is reached, the LDAP server sends back an LDAP disconnect notification and closes down the connection. MaxValRange 1500 Maximum Value Range. Controls the threshold at which the server will start returning the range option for attributes with a large number of values. The minimum value for this policy is GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 26
27 Query Limits TECHNICAL WHITE PAPER To improve the query response time for searches for Active Directory objects, searches are limited to 1,000 objects by default. However, you may want to increase this limit as your organization grows. You can control the buffer size that is allocated for storing the number of objects that are returned by a query search. To control the buffer size, you can either modify the registry on the search client or use Group Policy to set the buffer size on all computers in a domain, site, or OU. Modifying the registry to change the maximum query limit You can increase the number of objects that are returned by an Active Directory search on an individual search client by setting the limit in the registry. The REG_DWORD value named QueryLimit on the registry key HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Directory controls the maximum query limit on the local computer. Using Group Policy to change the maximum query limit You can use Group Policy to increase the maximum query limit on objects that are returned in response to a command to browse or search Active Directory when the command is issued from an operating system in the Windows 2000 Server family or the Windows Server 2003 family. In the User Configuration section of Group Policy, the setting is found in \Administrative Templates\Desktop\Active Directory\Maximum size of Active Directory searches. You can edit this setting with Group Policy Management Console (GPMC). Note Because this query limit policy is a user-based policy, it is not enforced until the user has logged off the system and then logged on again. Also, the policy only applies to default Active Directory tools, such as Active Directory Users and Computers. Any query limits that are set through Group Policy do not apply to LDAP queries that are performed programmatically 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 27
28 Global Catalog Searches The global catalog enables searches for Active Directory objects in any domain in the forest, without the need for subordinate referrals. Users can find an object of interest quickly without having to know which domain holds the object. Global catalog servers A global catalog server is a domain controller that stores extra information. The database on the global catalog server stores information about every object in the forest, instead of information for the objects in only one domain. The information about objects that occur in directory partitions for domains other than the local domain includes only a subset of attributes for each object. In this way, the global catalog enables forest-wide searches without requiring replication of the entire contents of Active Directory to every domain controller. The Knowledge Consistency Checker (KCC) process creates a replication topology that ensures delivery of the partial contents of every directory partition to every global catalog server in the forest. Note A global catalog server stores full copies of the schema and configuration directory partitions, which is the same as for any domain controller. By default, the server on which you install Active Directory to create the first domain in a new forest is a global catalog server. Thereafter, you must designate additional global catalog servers if you need them. Searching the domain vs. searching the global catalog The decision whether to search the domain or the global catalog is based on the scope of the search: When the scope of a search is the domain or an OU, the query can be resolved in the domain directory partition by using an LDAP search. When the scope of a search is the forest and the attributes that are being searched against are part of the global catalog, the query can be resolved in any directory partition by using a global catalog search GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 28
29 Searches that use the global catalog by default TECHNICAL WHITE PAPER To search the global catalog, instead of the local domain partition, you must specify port 3268 in the search tool that you are using, instead of port 389, the standard LDAP port. Anytime that you specify port 3268, you are searching in the global catalog. In addition, the global catalog is searched by default under the following conditions: During the logon process, when a user principal name (UPN) is presented. The global catalog is searched to find the domain and account name on the basis of the UPN. During the logon process, to expand universal groups. Universal group membership can span domains. It is possible, therefore, that a user has a membership in a universal group that is not in the logon domain. For this reason, the global catalog is contacted to search the membership of universal groups. If a membership is found, the group is attached to the user s logon credentials. When you select Entire Directory in a search-scope list in an Active Directory tool, such as Active Directory Users and Computers. When you write the distinguished name value for a property, where the distinguished name represents a nonlocal object. For example, if the member that you are adding is from a different domain, the global catalog is used to verify that the user object that is represented by the distinguished name actually exists. Global catalog search base For an LDAP search, you must supply a valid search base. For a global catalog search, the search base can be any value, including the value NULL ( ). A search base of NULL effectively scopes the search on the search computer to the global catalog. If you use a NULL search base with a scope of one level or subtree and specify port 389 (the default LDAP port), the search fails. Therefore, if you submit a NULL search to the global catalog port and then change the port to the LDAP port, you must change the search base for the search to succeed GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 29
30 Characteristics of a global catalog search TECHNICAL WHITE PAPER The following additional characteristics differentiate a global catalog search from a standard LDAP search: A global catalog search crosses directory partition boundaries. The extent of an LDAP search is the directory partition. A global catalog search does not return subordinate referrals. If you use port 3268 to request an attribute that is not in the global catalog, you do not receive a referral to it. Subordinate referrals are an LDAP response. When you query a server over port 3268, you receive global catalog responses, which are based solely on the contents of the global catalog. If you query the same server over port 389, you receive referrals for objects that are in the forest but whose attributes are not referenced in the global catalog. Anonymous queries By default, anonymous LDAP operations to Active Directory, other than rootdse searches and binds, are not permitted in Windows Server (Active Directory in Windows 2000 Server accepts anonymous requests; a successful result depends on objects having correct user permissions in Active Directory.) To enable anonymous binding to Active Directory in Windows Server 2003, you must change the seventh character of the dsheuristics attribute on the following directory object: CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,Root domain in forest Valid values for the dsheuristics attribute are 0 and 2. By default, the dsheuristics attribute does not exist, but its internal default is 0. If you set the seventh character to 2, anonymous clients can perform any operation that is permitted by the access control list (ACL). If the attribute is already set, do not modify any bits in the dsheuristics string other than the seventh bit. If the value is 2007 GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 30
31 not set, make sure that you provide the leading zeros up to the seventh bit. You can use Adsiedit.msc to make the change to the dsheuristics attribute. After you set the dsheuristics attribute, if you want anonymous users to be able to query Active Directory, you can enable anonymous access to specific directory objects. Users gain anonymous access to Active Directory objects through Anonymous Logon, which is a special security identifier (SID) that is used to represent anonymous network callers that perform an LDAP bind with NULL credentials GoPrint Systems, Inc. All rights reserved. GoPrint GS-4 LDAP 31
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
LDAP Directory Integration with Cisco Unity Connection
CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Enterprise Knowledge Platform 5.6
Enterprise Knowledge Platform 5.6 LDAP Authentication Integration Configuration Guide Document Information Document ID: EN151 Document title: EKP LDAP Authentication Integration Configuration Guide Version:
Enterprise Knowledge Platform
Enterprise Knowledge Platform Active Directory Authentication Integration Configuration Guide 1 Document Information Document ID: EN143 Document title: EKP Active Directory Authentication Integration Configuration
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
How To Authenticate On An Xtma On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Password Protected (For An Ipad) On An Ipa Or Ipa (For Mac) With A Log
WatchGuard Certified Training Fireware XTM Advanced Active Directory Authentication Courseware: Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Disclaimer
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
CYAN SECURE WEB HOWTO. NTLM Authentication
CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
How to integrate hp OpenView Service Desk with Microsoft Active Directory
How to integrate hp OpenView Service Desk with Microsoft Active Directory Copyright 2004 Page 1 of 26 Table of Contents Introduction 3 What is Active Directory 4 Installing Active Directory... 5 Working
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Configure Directory Integration
Client Configuration for Directory Integration, page 1 Client Configuration for Directory Integration You can configure directory integration through service profiles using Cisco Unified Communications
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Active Directory. By: Kishor Datar 10/25/2007
Active Directory By: Kishor Datar 10/25/2007 What is a directory service? Directory Collection of related objects Files, Printers, Fax servers etc. Directory Service Information needed to use and manage
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
[MS-FSADSA]: Active Directory Search Authorization Protocol Specification
[MS-FSADSA]: Active Directory Search Authorization Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
Introduction... 1. Installing and Configuring the LDAP Server... 3. Configuring Yealink IP Phones... 30. Using LDAP Phonebook...
Introduction... 1 Installing and Configuring the LDAP Server... 3 OpenLDAP... 3 Installing the OpenLDAP Server... 3 Configuring the OpenLDAP Server... 4 Configuring the LDAPExploreTool2... 8 Microsoft
Integrating Webalo with LDAP or Active Directory
Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with
Managing an Active Directory Infrastructure
3 CHAPTER 3 Managing an Active Directory Infrastructure Objectives This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure
Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work
Where to configure: User Tools Basic Configuration Key Operator Tools older products Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Administrator Tools newest products
Managing an Active Directory Infrastructure O BJECTIVES
O BJECTIVES This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure and Managing and Maintaining an Active Directory Infrastructure
Forests, trees, and domains
Active Directory is a directory service used to store information about the network resources across a. An Active Directory (AD) structure is a hierarchical framework of objects. The objects fall into
1 Introduction. Windows Server & Client and Active Directory. www.exacq.com
Windows Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the AD infrastructure
The following gives an overview of LDAP from a user's perspective.
LDAP stands for Lightweight Directory Access Protocol, which is a client-server protocol for accessing a directory service. LDAP is a directory service protocol that runs over TCP/IP. The nitty-gritty
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
eprism Enterprise Tech Notes
eprism Enterprise Tech Notes Utilizing Microsoft Active Directory for eprism s Directory Services Context eprism can integrate with an existing LDAP (Lightweight Directory Access Protocol) directory for
StarTeam/CaliberRM LDAP QuickStart Manager 2009. Administration Guide
StarTeam/CaliberRM LDAP QuickStart Manager 2009 Administration Guide Borland Software Corporation 8310 N Capital of Texas Bldg 2, Ste 100 Austin, TX 78731 USA http://www.borland.com Borland Software Corporation
INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE
INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE MICROSOFT ACTIVE DIRECTORY INTEGRATION Agostinho Tavares Version 1.0 Published 06/05/2015 This document describes how Inuvika OVD 1.0 can be integrated with Microsoft
Integrate with Directory Sources
Cisco Jabber integrates with directory sources in on-premises deployments to query for and resolve contact information. Learn why you should enable synchronization and authentication between your directory
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
LDAP and Active Directory Guide
LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring
Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
Active Directory Commands ( www.ostadbook.com )
CSVDE Script Example: Active Directory Commands ( www.ostadbook.com ) 1 Dn, samaccountname, userprincipalname, department, useraccountcontrol, objectclass "CN=Amir Nosrati,OU=IT,DC=Ostadbook,DC=com",Amir-n,[email protected],MCSE,512,user
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
HELP DOCUMENTATION UMRA REFERENCE GUIDE
HELP DOCUMENTATION UMRA REFERENCE GUIDE Copyright 2013, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means without
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory HOWTO, 2 nd edition Introduction... 2 Integration using the Lights-Out Migration Utility... 2 Integration using the ilo web interface...
Planning LDAP Integration with EMC Documentum Content Server and Frequently Asked Questions
EMC Documentum Content Server and Frequently Asked Questions Applied Technology Abstract This white paper details various aspects of planning LDAP synchronization with EMC Documentum Content Server. This
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Active Directory Integration Notes. Introduction. Overview
Active Directory Integration Notes Created July 2006 Revised October 2007 Table of Contents Active Directory Integration Notes... 1 Introduction... 1 Overview... 1 Prerequisites... 2 Installation... 2
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
WirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Deploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
Step-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
This presentation explains how to integrate Microsoft Active Directory to enable LDAP authentication in the IBM InfoSphere Master Data Management
This presentation explains how to integrate Microsoft Active Directory to enable LDAP authentication in the IBM InfoSphere Master Data Management Collaboration Server. Before going into details, there
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
1 Introduction. Ubuntu Linux Server & Client and Active Directory. www.exacq.com Page 1 of 14
Ubuntu Linux Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Dell KACE K1000 Management Appliance. Service Desk Administrator Guide. Release 5.3. Revision Date: May 13, 2011
Dell KACE K1000 Management Appliance Service Desk Administrator Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
Nevepoint Access Manager 1.2 BETA Documentation
Nevepoint Access Manager 1.2 BETA Documentation Table of Contents Installation...3 Locating the Installation Wizard URL...3 Step 1: Configure the Administrator...4 Step 2: Connecting to Primary Connector...4
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA Technical Guide Active Directory/Infinite Campus Integration in the KETS Environment Version 1.3 February 24, 2015
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
Installation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
Technical Bulletin 41137
Technical Bulletin 41137 Best Practices When Using Corporate Directory on SoundPoint IP, SoundStation IP, and Polycom VVX Phones This technical bulletin provides recommended configuration settings for
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Single Sign-On in SonicOS Enhanced 4.0
Single Sign-On in SonicOS Enhanced 4.0 Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS Enhanced 4.0. This document
Configuring LDAP Directory Search on SPA SIP IP Phones
Application Note EDCS-711822 Updated January 2009 Configuring LDAP Directory Search on SPA SIP IP Phones 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Proprietary Information. Page
Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor
Adobe Enterprise & Developer Support Knowledge Article ID: c4715 bc Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor In addition to manually creating users and user permissions,
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
IPedge Feature Desc. 5/25/12
OVERVIEW IPedge Enterprise Manager Active Directory Sync (ADSync) is a feature that automatically configures telephone users in the IPedge system based on data entry in the Active Directory service. Active
Active Directory Diagnostic Tool
Active Directory Diagnostic Tool Active Directory Diagnostic Tool (Ntdsutil.exe)...2 Invoking Ntdsutil s and Parameters...2 How to Use Ntdsutil Menu s...2 How Ntdsutil Processes Input...2 How to Use Arguments
ProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
User Management Resource Administrator. UMRA tables. User Guide
User Management Resource Administrator UMRA tables User Guide ii Contents Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Everything Developers Need to. and/or ADAM, and/or LDAP
Everything Developers Need to Know About Active Directory and/or ADAM, and/or LDAP My Boring & Generic Bio Slide Working with Active Directory since Oct 1999 (RTM date) Currently run large Active Directory
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
INSTALLATION GUIDE. BrightSign Network Enterprise Edition 3.5
INSTALLATION GUIDE BrightSign Network Enterprise Edition 3.5 BrightSign, LLC. 16795 Lark Ave. Suite 200, Los Gatos, CA 95032 408-852-9263 www.brightsign.biz TABLE OF CONTENTS Introduction 1 What s New
EVERYTHING LDAP. Gabriella Davis [email protected]
EVERYTHING LDAP Gabriella Davis [email protected] Agenda What is LDAP? LDAP structure and behavior Domino and LDAP LDAP tools Notes as an LDAP client IBM Lotus Sametime, Quickr, Connections,
How the Active Directory Installation Wizard Works
How the Active Directory Installation Wizard Works - Directory Services: Windows Serv... Page 1 of 18 How the Active Directory Installation Wizard Works In this section Active Directory Installation Wizard
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Adeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services
QUICKStart Guide Integrating Active Directory Lightweight Services 2010 CRYPTOCard Corp. All rights reserved. http://www.cryptocard.com Trademarks CRYPTOCard, CRYPTO Server, CRYPTO Web, CRYPTO Kit, CRYPTO
ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
ShoreTel Active Directory Import Application
INSTALLATION & USER GUIDE ShoreTel Active Directory Import Application ShoreTel Professional Services Introduction The ShoreTel Active Directory Import Application allows customers to centralize and streamline
