Using LDAP for User Authentication



Similar documents
Using LDAP for User Authentication

Using LDAP Authentication in a PowerCenter Domain

Configuring User Identification via Active Directory

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

PineApp Surf-SeCure Quick

EPiServer Operator's Guide

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

Secure Messaging Server Console... 2

Active Directory Requirements and Setup

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Authentication Methods

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Skyward LDAP Launch Kit Table of Contents

How To - Implement Single Sign On Authentication with Active Directory

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Configuring and Using the TMM with LDAP / Active Directory

Version 9. Active Directory Integration in Progeny 9

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

Delegated Administration Quick Start

netld External Authentication Setup Guide

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

Click Studios. Passwordstate. Installation Instructions

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

HP Device Manager 4.7

Getting Started with Clearlogin A Guide for Administrators V1.01

User-ID Best Practices

User Service and Directory Agent: Configuration Best Practices and Troubleshooting

Sample Configuration: Cisco UCS, LDAP and Active Directory

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Active Directory Integration

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

Novell File Reporter 2.5 Who Has What?

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Polar Help Desk Installation Guide

PriveonLabs Research. Cisco Security Agent Protection Series:

Discovery Guide. Secret Server. Table of Contents

Embedded Web Server Security

Protected Trust Directory Sync Guide

FTP Server Configuration

User Identification (User-ID) Tips and Best Practices

LDAP Authentication and Authorization

NAS 206 Using NAS with Windows Active Directory

Wazza s QuickStart 17. Leopard Server - Blogs & Wikis

Security Assertion Markup Language (SAML) Site Manager Setup

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor

Nexio Insight LDAP Synchronization Service

escan SBS 2008 Installation Guide

IIS, FTP Server and Windows

User Source and Authentication Reference

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services

Adeptia Suite LDAP Integration Guide

Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory

VERALAB LDAP Configuration Guide

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

Configuring Sponsor Authentication

Avatier Identity Management Suite

Here, we will discuss step-by-step procedure for enabling LDAP Authentication.

Livezilla How to Install on Shared Hosting By: Jon Manning

Microsoft FTP Configuration Guide for Helm 4

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE

Mail Programs. Manual

Chapter 3 Authenticating Users

Quality Center LDAP Guide

The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:

Introduction to Directory Services

Setting Up Scan to SMB on TaskALFA series MFP s.

WirelessOffice Administrator LDAP/Active Directory Support

ProxySG TechBrief LDAP Authentication with the ProxySG

Configuring Global Protect SSL VPN with a user-defined port

Installation Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Installation Guide

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

Administrator's Guide

GoDaddy (CentriqHosting): Data driven Web Application Deployment

Load Balancing and Clustering in EPiServer

How to Logon with Domain Credentials to a Server in a Workgroup

Click Studios. Passwordstate. Installation Instructions

HP Device Manager 4.6

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address

Identity Management in Quercus. CampusIT_QUERCUS

1 Introduction. Windows Server & Client and Active Directory.

Importing data from Linux LDAP server to HA3969U

Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)

Creating Home Directories for Windows and Macintosh Computers

SchoolBooking LDAP Integration Guide

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Transcription:

Using LDAP for User Authentication Product version: 4.50 Document version: 1.1 Document creation date: 03-06-05 Purpose This technical note describes how to configure and set up EPiServer to use an LDAP server for user authentication. This is an advanced operation and good knowledge of your LDAP environment is required. The contents of this document are protected by copyright. Contents of the document may be freely copied and distributed, either digitally or in printed format, to all EPiServer users. EPiServer is a registered trademark of ElektroPost Stockholm AB. Other product and company names mentioned in this document may be the trademarks for their respective owners.

2 Using LDAP for User Authentication Revision Information Document version Comments 1.0 4.50 release version. 1.1 Updated "Requirements" chapter to indicate Windows 2000 or later. Table of Contents REQUIREMENTS 2 INITIAL SETUP TO USE ACTIVE DIRECTORY 2 INITIAL SETUP TO USE EDIRECTORY 3 IMPORT GROUPS FROM LDAP SERVER 3 USING LDAP ACCOUNTS FOR EDITORS AND ADMINISTRATORS 4 ADVANCED CONFIGURATION OPTIONS 4 Requirements EPiServer 4.0.0.20 or later running on Windows 2000 Server or later. EPiServer uses the native Windows LDAP APIs introduced in Windows 2000 and does not run on earlier versions of Windows. A Windows Active Directory (AD) server and an account with read/browse rights to the Active Directory. - or - A Novell edirectory version 8.5 or later and an account with read/browse rights to the entire edirectory. Initial Setup to Use Active Directory Open web.config, which is in the root folder of your EPiServer installation, and modify the following settings under configuration/appsettings. See Advanced Configuration Options for more information. Key Value The DNS name or IP address of the AD domain, for example company.com. The domain of the account that you want to use to access information from your AD, for example MyDomain. If you are using simple authentication, this should be left blank. The username of the account that you want to use to access information from your AD, for instance MyUser (If you are using simple authentication this should be MyDomain\MyUser). This

Initial Setup to Use edirectory 3 EPnLdapAuthenticationType 1158 EPfLdapAuthenticateWithBind True account should have read/browse access to the entire tree. Note The role Account Operators should have sufficient access rights in the AD. The password for the account that you want to use to access information from your AD. The root of the AD domain. Using the same example as before (company.com) it should be dc=company,dc=com. Type Set this parameter to AD if you use AuthenticationMode = Windows. This will enable check of LDAP group membership event for Windows accounts. Note This does not work in EPiServer 4.21 and previous versions. Initial Setup to Use edirectory Open web.config, which is in the root folder of your EPiServer installation, and modify the following settings under configuration/appsettings. See Advanced Configuration Options for more information. Key Value The DNS name or IP address of the AD domain, for example company.com. Empty An account that has read/browse rights to the edirectory, for instance cn=ldapbrowser,o=company. Note You must enter the account name as a fully qualified LDAP name. The more common "dotted notation" usually used with NDS/eDirectory will not work. The password for the account that you want to use to access information from your edirectory. Empty EPnLdapAuthenticationType 128 EPfLdapAuthenticateWithBind False Import Groups from LDAP Server To be able to fully utilize the LDAP server for authentication, you need to import the groups / organizational units (OU) that you want to use for controlling access to EPiServer. If you skip this step, you will still be able to use accounts from the LDAP server, but they will only belong to the group "Everyone" from EPiServer s point-of-view.

4 Using LDAP for User Authentication Note In AD, a group that is used in EPiServer and is defined as Primary Group for a user cannot be retrieved when EPiServer queries LDAP for group membership. Normally this means that you can import a primary group (such as Domain Users) to EPiServer, but an LDAP user that has this group as primary group will not act as a member of this group in EPiServer. How to import groups: 1. Log on and go to Admin mode. 2. Select Administer groups under Access rights. 3. In the text area above the Import from LDAP server button, enter a search expression to retrieve a list of groups/ous from the LDAP server. The search expression should usually be in the form prefix*, where prefix will match the beginning of a group name or OU. If the search expression is left blank, all groups will be returned. Note that this can take a long time and may fail if excessive amounts of data are returned. 4. Click Import from LDAP server to retrieve a group list. 5. Select the groups that you want to import and click Save. You can now use the imported groups to set access rights for pages in EPiServer. Note Previously selected groups should be selected as default when you make a new search. Using LDAP Accounts for Editors and Administrators If you want to use LDAP accounts for Editors and Administrators, you need to perform additional configuration changes in web.config. In the following example we assume that the groups "EPiServerAdmins-Users-company-com" (actual LDAP name is CN=EPiServerAdmins,CN=Users,DC=company,DC=com) and "EPiServerEditors- Users-company-com" (actual LDAP name is CN=EPiServerEditors,CN=Users,DC=company,DC=com) have been imported. All LDAP accounts that belong to the EPiServerAdmins group should have access to Admin mode, and accounts belonging to EPiServerEditors should have access to the Edit mode. In web.config, locate the section <location path="admin"> and the contained tag that reads <allow roles="webadmins, Administrators" />. Change this tag to <allow roles="webadmins, Administrators, EPiServerAdmins-Users-company-com" />. Note To access the system settings, you must use a Windows account that has local Administrator privileges on the Web server. In web.config, locate the section <location path="edit"> and the contained tag that reads <allow roles=" WebAdmins, WebEditors, Administrators" />. Change this tag to <allow roles=" WebAdmins, WebEditors, Administrators, EPiServerEditors-Users-company-com " />. This change is enough to give users access to the Edit mode, but to be allowed to edit pages you must set the correct access rights for the pages that they should be allowed to edit. Advanced Configuration Options This is a description of the LDAP configuration settings in web.config.

Advanced Configuration Options 5 EPnLdapAuthenticationType Host name of LDAP server or the name of the Active Directory domain. If you are using an AD domain, it is highly recommended to use the domain name to take advantage of failover functions, etc. For example "ldap.microsoft.com" or "192.168.12.23". Should be set to the domain of the user if you are using simple authentication. If you are using Negotiate authentication, this should be left blank. A user that has read/browse rights to the entire tree where you want to authenticate. Password for If you want to limit the scope of group searches, set this parameter to the desired starting point. For ActiveDirectory sites, you must set this parameter to the root (or somewhere below the root). Otherwise searches will be performed against schema data. For the ActiveDirectory domain company.com, the root context should be "dc=company,dc=com". A numeric value to select the authentication type. Possible values are: 128 = Simple authentication, i e clear text. 1158 = Negotiate authentication. Add 131072 to force communication over SSL. EPfLdapAuthenticateWithBind If your LDAP server does not support the ldap_compare command to check passwords, set to True to use a second Bind to provide the authentication service. The ldap_compare is a much faster operation than performing a bind so you should set this parameter to False if possible. Type For AD, set this parameter to AD if you use AuthenticationMode = Windows. This will enable check of LDAP group membership event for Windows accounts. Note This does not work in EPiServer 4.21 and previous versions.