Enterprise Knowledge Platform 5.6



Similar documents
Enterprise Knowledge Platform

CYAN SECURE WEB HOWTO. NTLM Authentication

Configuring and Using the TMM with LDAP / Active Directory

Enterprise Knowledge Platform

HP Device Manager 4.7

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Windows.NET Server 2003 Domains & Active Directory

Active Directory LDAP Quota and Admin account authentication and management

Configuring User Identification via Active Directory

How To Search For An Active Directory On Goprint Ggprint Goprint.Org (Geoprint) (Georgos4) (Goprint) And Gopprint.Org Gop Print.Org

eprism Enterprise Tech Notes

PineApp Surf-SeCure Quick

Sample Configuration: Cisco UCS, LDAP and Active Directory

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Importing data from Linux LDAP server to HA3969U

Configuring Sponsor Authentication

Troubleshooting Active Directory Server

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

Using RADIUS Agent for Transparent User Identification

HP Device Manager 4.6

VMware vcenter Discovered Machines Import Tool User's Guide Version for vcenter Configuration Manager 5.3

CA Spectrum and CA Embedded Entitlements Manager

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Active Directory Diagnostic Tool

Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)

Active Directory Integration

F-Secure Messaging Security Gateway. Deployment Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Smart Card Authentication Client. Administrator's Guide

User Service and Directory Agent: Configuration Best Practices and Troubleshooting

PriveonLabs Research. Cisco Security Agent Protection Series:

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

How to integrate hp OpenView Service Desk with Microsoft Active Directory

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Configuring MailArchiva with Insight Server

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Integrating LANGuardian with Active Directory

Using LDAP Authentication in a PowerCenter Domain

WirelessOffice Administrator LDAP/Active Directory Support

Aradial Installation Guide

Enterprise Knowledge Platform 5.6

IPedge Feature Desc. 5/25/12

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

V Series Rapid Deployment Version 7.5

BlackShield ID Agent for Remote Web Workplace

NSi Mobile Installation Guide. Version 6.2

Sophos Mobile Control Installation guide

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

Adeptia Suite LDAP Integration Guide

Summary. How-To: Active Directory Integration. April, 2006

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

LDAP Directory Integration with Cisco Unity Connection

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Installation and Configuration Guide

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

753 Broad Street Phone: Suite 200 Fax: Augusta, GA Copyrights

Technical Brief for Windows Home Server Remote Access

How To Use Directcontrol With Netapp Filers And Directcontrol Together

WS_FTP Server. User Guide

System Administration Guide

Quality Center LDAP Guide

OCS Training Workshop LAB14. Setup

Quick Start Guide for VMware and Windows 7

How To Use Libap With A Libap Server With A Mft Command Center And Internet Server

Simple Scan to Setup Guide

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

ADS Integration Guide

Setup and configuration for Intelicode. SQL Server Express

Installation Notes for Outpost Network Security (ONS) version 3.2

Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Skyward LDAP Launch Kit Table of Contents

How To - Implement Single Sign On Authentication with Active Directory

Authentication Methods

Using LDAP for User Authentication

Setting Up Scan to SMB on TaskALFA series MFP s.

Transparent Identification of Users

Your Question. Net Report Answer

Active Directory Authentication Integration

PGP Desktop LDAP Enterprise Enrollment

Upgrade Guide BES12. Version 12.1

EMC NetWorker. Security Configuration Guide. Version 8.2 SP REV 02

Using DC Agent for Transparent User Identification

LDAP Operation Guide

Monitor Print Popup for Mac. Product Manual.

LISTSERV LDAP Documentation

NAT TCP SIP ALG Support

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

Managing Users and Identity Stores

How to Logon with Domain Credentials to a Server in a Workgroup

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address

CA Unified Infrastructure Management Server

Copyright 2012 Trend Micro Incorporated. All rights reserved.

TypingMaster Intra. LDAP / Active Directory Installation. Technical White Paper (2009-9)

Configuring IBM Cognos Controller 8 to use Single Sign- On

Transcription:

Enterprise Knowledge Platform 5.6 LDAP Authentication Integration Configuration Guide

Document Information Document ID: EN151 Document title: EKP LDAP Authentication Integration Configuration Guide Version: 1.2 Document date: 15 April 2009 This document may be revised from time to time. Please check NetDimensions Support site at www.netdimensions.com/support for updates to this and other documents or send an e-mail to support@netdimensions.com to request the most recent version. Please report any errors or feedback with this document by sending an e-mail to support@netdimensions.com. Copyright Information Copyright 2000-2009 by NetDimensions Ltd. All Rights Reserved. Information in this document is subject to change without notice. The software described herein is furnished under a license agreement, and it may be copied only in accordance with the terms of that agreement. No part of this publication may be reproduced, transmitted, or translated in any form or by any means without the prior written permission of NetDimensions Ltd. All company and product names used herein may be trademarks or registered trademarks of their respective companies unless stated otherwise. How to Contact NetDimensions Support +852 2122 4588 1 866 206 6698 US toll-free number +852 2122 4588 support@netdimensions.com www.netdimensions.com/support General Enquiries +852 2122 4500 +852 2122 4588 info@netdimensions.com www.netdimensions.com

Table of Contents Description...1 About This Guide... 1 If You Need Help... 1 EKP Configuration...2 Troubleshooting...4 Additional Resources...9 Lightweight Directory Access Protocol Version 3... 9 Open Group and the Directory Interoperability Forum... 9

Description About This Guide This document describes the steps required in configuring EKP to use Lightweight Directory Access Protocol (LDAP) to perform user authentication. EKP has a built-in login adapter that integrates with the LDAP server to perform user login authentication. It is implemented by using the Netscape Directory SDK 4.1 that supports both LDAP version 2 and version 3. If You Need Help If you cannot resolve a configuration problem using this guide or the online help, or if you should have any queries related to the technology employed within EKP, your first line of contact should be as described in your Technical Support Contract. For other queries, or if you are not sure whom to contact, NetDimensions Ltd. may be contacted at info@netdimensions.com. Please also refer to the support section of the NetDimensions web site at www.netdimensions.com for the latest information regarding various services. 1

EKP Configuration 1. Enable the LDAP interface in EKP by editing the ekp.properties which is located in the <webapps>/ekp/web-inf/conf folder. See the following example, default.ldap_dir=o=netdimensions.com default.ldap_host1=corp-ldap1 default.ldap_port1=389 default.ldap_host2=corp-ldap2 default.ldap_port2=389 default.ldap_host3=corp-ldap3 default.ldap_port3=389 default.ldap_timeout=300 default.ldap_dir (mandatory) default.ldap_host1 (mandatory) default.ldap_port1 (mandatory) default.ldap_host2 (mandatory) default.ldap_port2 (mandatory) default.ldap_host3 (mandatory) default.ldap_port3 (mandatory) default.ldap_timeout (mandatory) default.ldap_filter (optional) Defines the base distinguished name from which it starts the search Defines the primary LDAP server (enter hostname or IP address) Define the port number of the LDAP server Defines the second backup LDAP server (enter hostname or IP address) Define the port number of the second backup LDAP server Defines the third backup LDAP server (enter hostname or IP address) Define the port number of the third backup LDAP server Specifies the timeout period in seconds before switching to use the next backup LDAP server. Additional search filter to locate a user entry. (Note: default is search by uid only) Note If there is no backup LDAP server, you need to set the backup LDAP server same as the primary one. 2. Configure the users to use external authentication Logon EKP as administrator, go to Manage > User Manager > User Editor. Set External Authentication to Yes for users who want to use LDAP authentication. 2

Note In order to do the above, the users have to be created in EKP beforehand and the User ID has to match with the uid in the LDAP. Users with External Authentication set to No will be using default internal authentication, which means that their password is stored in the EKP database. 3

Troubleshooting LDAP Authentication Configure EKP.PROPERTIES default.ldap_dir Defines the base distinguished name from which it starts the search must match the domain components specified in the DN string. default.ldap_dir=dc=netdimensions,dc=com default.ldap_host# Defines the LDAP server. Can be hostname, IP or DNS name default.ldap_host1=win2003-svr would be win2003-svr with the domain name Netdimensions.com default.ldap_host1=192.168.99.10 ldap.activedirectorydn specifies the name of the user for initial EKP binding to the AD, so that directory searches can be done later. The DN Distinguished Name string will be determined by how your LDAP is configured. You can use ADSI Edit on your AD servers to view the format of the DN value assigned to this user ekp so you would need to specify the same parameters. ldap.activedirectorydn=cn=ekp,cn=users,dc=netdimensions,dc=com In larger organizations It could be be more complex with multiple OUs for Organizational Units ldap.activedirectorydn=cn=ekp,ou=it,ou=users,ou=hongkong,dc=hongkong,dc=netdimension, DC=com ldap.activedirectorypassword specifies the password of the user Note: ekp is the name of the user created in the previous section and ekp_password is the password of user ekp. default.ldap_dir=dc=hongkong,dc=netdimensions,dc=com default.ldap_host1=192.168.99.10 default.ldap_port1=389 default.ldap_host2=192.168.99.12 default.ldap_port2=389 default.ldap_host3=192.168.69.91 default.ldap_port3=389 default.ldap_timeout=300 # Define the active directory DN and password for initial binding. ldap.activedirectorydn=cn=ekp,ou=it,ou=users,ou=hongkong,dc=hongkong,dc=netdimensions, DC=com ldap.activedirectorypassword= ekp_password 4

Using LDAP Tools To Query Your LDAP Servers Ensure you are able to connect to your LDAP servers on your specified port by telneting to it. telnet 192.168.99.10 389 - should open a connection if it does not then its likley the firewall is preventing you from doing so. Add rule between your server & the LDAP server for that port and try again. You can verify that your LDAP parameters are correct by using LDAP tools to query your LDAP servers with your parameters & password. ldp.exe from http://www.computerperformance.co.uk/w2k3/utilities/ldp.htm Install on your ekp server and use your parameters to check if you can communicate with your listed LDAP servers. LDP.EXE to "192.168.99.10", 389 binding to user ekp with password ekp_password DN=CN=ekp,OU=IT,OU=Users,OU=HongKong,DC=hongkong,DC=netdimension,DC=com Sample Output of Successful Query & Binding of User ekp to "192.168.99.10", 389 ld = ldap_open("192.168.99.10", 389); Established connection to 192.168.99.10. Retrieving base DSA information... Result <0>: (null) Matched DNs: Getting 1 entries: >> Dn: 1> currenttime: 08/12/2009 11:50:21 Central Standard Time Central Daylight Time; 1> subschemasubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=netdimensions,DC=com; 1> dsservicename: CN=NTDS Settings,CN=NTDCHONGKONG1,CN=Servers,CN=HongKong,CN=Sites,CN=Configuration,DC=netdim ensions,dc=com; 3> namingcontexts: CN=Configuration,DC=netdimensions,DC=com; CN=Schema,CN=Configuration,DC=netdimensions,DC=com; DC=hongkong,DC=netdimensions,DC=com; 23> supportedcontrol... 2> supportedldapversion: 3; 2; 12> supportedldappolicies: MaxPoolThreads; MaxDatagramRecv; MaxReceiveBuffer; InitRecvTimeout; MaxConnections; MaxConnIdleTime; MaxPageSize; MaxQueryDuration; MaxTempTableSize; MaxResultSetSize; MaxNotificationPerConn; MaxValRange;. 1> dnshostname: ntdchongkong1.hongkong.netdimensions.com; 5

1> ldapservicename: netdimensions.com:ntdchongkong1$@hongkong.netdimensions.com; 1> servername: CN=NTDCHONGKONG1,CN=Servers,CN=HongKong,CN=Sites,CN=Configuration,DC=netdimensions, DC=com; 3> supportedcapabilities: 1.2.840.113556.1.4.800; 1.2.840.113556.1.4.1670; 1.2.840.113556.1.4.1791; 1> issynchronized: TRUE; 1> isglobalcatalogready: TRUE; 1> domainfunctionality: 0 = ( DS_BEHAVIOR_WIN2000 ); 1> forestfunctionality: 0 = ( DS_BEHAVIOR_WIN2000 ); 1> domaincontrollerfunctionality: 2 = ( DS_BEHAVIOR_WIN2003 ); ----------- res = ldap_bind_s(ld, NULL, &NtAuthIdentity, 1158); // v.3 {NtAuthIdentity: User='ekp'; Pwd= <unavailable>; domain = 'DN=CN=ekp,OU=IT,OU=Users,OU=HongKong,DC=hongkong,DC=netdimensions,DC=com'.} Authenticated as dn:'ekp'. This confirms that the parameters for that particular LDAP server 192.168.99.10 will work and you can do same test for each of your LDAP servers. If the query to the LDAP servers fail, check your parameters and check you have enabled your firewall to communicate on the specified ports. LDP.EXE returns same Error<0x51>: Fail to connect message when I query the wrong server or wrong port. ld = ldap_open("192.168.99.99", 389); Error <0x51>: Fail to connect to 192.168.99.99. ld = ldap_open("192.168.99.10", 355); Error <0x51>: Fail to connect to 192.168.99.10. If you get initial LDAP query info but then Error <49>: ldap_bind_s() failed: Invalid Credentials. it means the LDAP Server parameters were successful but the bind to user and/or password failed. res = ldap_simple_bind_s(ld, 'ekp', <unavailable>); // v.3 Authenticated as dn:'ekp'. res = ldap_bind_s(ld, NULL, &NtAuthIdentity, 1158); // v.3 {NtAuthIdentity: User='ekp'; Pwd= <unavailable>; domain = 'DN=CN=ekp,OU=IT,OU=Users,OU=HongKong,DC=HongKong,DC=netdimensions,DC=com'.} Error <49>: ldap_bind_s() failed: Invalid Credentials. Server error: 8009030C: LdapErr: DSID-0C09043E, comment: AcceptSecurityContext error, data 0, vece Once you have verified your LDAP connection and parameters with successful authentication using LDAP tools you can proceed to attempt log in on your ekp server. 6

On the ekp site logging in with user ekp and check the ekp.log for any errors. You should have ekp set up in debug mode. Sample EKP.LOG - user ekp logs in after successful authentication with LDAP server Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.connect): Connecting to LDAP server at 192.168.99.10:389 Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.connect): Connected OK Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): Authenticating to LDAP server as: 'CN=ekp,OU=IT,OU=Users,OU=HongKong,DC=HongKong,DC=netdimensions,DC=com'; password: '*********' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): Authenticated OK Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): about to search Active Directory server for user: 'ekp' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): base: 'dc=hongkong,dc=netdimensions,dc=com' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): filter: '(&( (objectclass=user)(objectclass=person))( (cn=ekp)(samaccountname=ekp)))' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): Search returned normally with 2 results Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): results.hasmoreelements: true Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticateEntry): LDAP DN(basic): CN=ekp,OU=IT,OU=Users,OU=HongKong,DC=HongKong,DC=netdimensions,DC=com Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.connect): Connecting to LDAP server at 192.168.99.10:389 Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.connect): Connected OK 2009/Aug/12 23:04:42 Severity(DEBUG) Source(com.netdimen.jdbc.core.JdbcTemplate.logSql): executing sql [SELECT * FROM userstats WHERE userid =?] for arguments ('ekp') 2009/Aug/12 23:04:42 Severity(DEBUG) Source(com.netdimen.jdbc.core.JdbcTemplate.logSql): executing sql [SELECT COUNT(*) FROM messages WHERE readindicator = 'N' AND userid =?] for arguments ('ekp') 7

EKP.LOG showing LDAP Authentication Failed Use LDAP tools to verify your parameters. 2009/Aug/12 09:23:16 Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.connect): Connecting to LDAP server at 192.168.99.10:389 2009/Aug/12 09:23:16 Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.connect): Connected OK 2009/Aug/12 09:23:16 Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): Authenticating to LDAP server as: 'CN=ekp,OU=IT,OU=Users,OU=HongKong,DC=HongKong,DC=netdimensions,DC=com'; password: '*********' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): Authenticated OK Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): about to search Active Directory server for user: 'ekp' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): base: 'dc=hongkong.netdimensions.com' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): filter: '(&( (objectclass=user)(objectclass=person))( (cn=ekp)(samaccountname=ekp)))' Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): Search returned normally with 1 results Severity(DEBUG) Source(com.netdimen.ldap.LdapServer.authenticate): results.hasmoreelements: true Severity(DEBUG) Source(com.netdimen.auth.login.LDAPLoginAdapter.authenticate): LDAP server 1 authentication failed com.netdimen.auth.login.generalauthenticationexception at com.netdimen.ldap.ldapserver.authenticate(ldapserver.java:255) at com.netdimen.auth.login.ldaploginadapter.authenticate(ldaploginadapter.java:50) 8

Additional Resources See the following resources for further information: Lightweight Directory Access Protocol Version 3 The IETF LDAPv3 Working Group: http://www.ietf.org/html.charters/ldapbis-charter.html The LDAPv3 Working Group archived newsgroup: http://www.openldap.org/lists/ietf-ldapbis/ RFC 3377, the current definition of LDAPv3: ftp://ftp.rfc-editor.org/in-notes/rfc3377.txt Open Group and the Directory Interoperability Forum The Open Group s VSLDAP compliance testing suite overview: http://www.opengroup.org/directory/mats/ldap2000/dsvsldap.pdf The Directory Interoperability Forum (DIF): http://www.opengroup.org/directory/ 9