Version 9. Active Directory Integration in Progeny 9



Similar documents
Version 9. Generating SSL Certificates for Progeny Web

Version 9 Client Workflow Interface (Dashboard) Quick Start

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

ProxySG TechBrief LDAP Authentication with the ProxySG

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Sample Configuration: Cisco UCS, LDAP and Active Directory

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

HP Device Manager 4.7

CA Performance Center

simplify printing TX Guide v. 1. make IT simple Tricerat, Inc Cronridge Drive Suite 100 Owings Mills, MD , All rights Reserved

HP Device Manager 4.6

CA Unified Infrastructure Management Server

Skyward LDAP Launch Kit Table of Contents

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Adeptia Suite LDAP Integration Guide

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

Novell Open Workgroup Suite Small Business Edition Helpdesk

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Configuring and Using the TMM with LDAP / Active Directory

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Strong Authentication for Microsoft TS Web / RD Web

An Oracle White Paper March Integrating Microsoft SharePoint Server With Oracle Virtual Directory

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

How To Use Libap With A Libap Server With A Mft Command Center And Internet Server

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

Basic Exchange Setup Guide

Configuring Sponsor Authentication

LDAP Authentication and Authorization

Symantec Backup Exec Management Plug-in for VMware User's Guide

Enterprise Toolbar User s Guide. Revised March 2015

MobileStatus Server Installation and Configuration Guide

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Using LDAP for User Authentication

PineApp Surf-SeCure Quick

WirelessOffice Administrator LDAP/Active Directory Support

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

Configuring and Monitoring SharePoint Servers

DIGIPASS Authentication for GajShield GS Series

LDAP Synchronization Agent Configuration Guide for

Using Microsoft Active Directory Server and IAS Authentication

Using LDAP Authentication in a PowerCenter Domain

VOIP-500 Series Phone CUCM 8.0.3a Integration Guide

WatchDox for Windows User Guide. Version 3.9.0

Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014

Subversion Server for Windows

Nexio Insight LDAP Synchronization Service

MadCap Software. Upgrading Guide. Pulse

Application Note. Gemalto s SA Server and OpenLDAP

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

LANDESK Service Desk. Desktop Manager

CA Nimsoft Service Desk

How To Configure A Microsoft Virtual Server On A Microsoul.Com (Windows) 2005 (Windows 2005) (Windows Vvirtual) (Powerpoint) (Msof) (Evil) (Microsoul) (Amd

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Active Directory Manager Pro Quick start Guide

CA VPN Client. User Guide for Windows

Training module 2 Installing VMware View

LifeSize Control Installation Guide

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Active Directory Change Notifier Quick Start Guide

Group Management Server User Guide

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

4.0. Offline Folder Wizard. User Guide

formerly Help Desk Authority HDAccess Administrator Guide

Configuring and Monitoring Event Logs

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

Enterprise Reporter Report Library

XenClient Enterprise Synchronizer Installation Guide

Basic Exchange Setup Guide

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Strong Authentication for Microsoft SharePoint

Authentication Methods

Release Information. Copyright. Limit of Liability. Trademarks. Customer Support

Troubleshooting Active Directory Server

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

CA NetQoS Performance Center

DualShield Authentication Platform

Secure Web Service - Hybrid. Policy Server Setup. Release Manual Version 1.01

Configuring User Identification via Active Directory

Dell One Identity Cloud Access Manager How to Configure for High Availability

Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

Configuring and Integrating JMX

Driver for Sentinel. Implementation Guide. June 2013

Getting Started with Clearlogin A Guide for Administrators V1.01

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

CA Technologies SiteMinder

Dell Statistica Statistica Enterprise Installation Instructions

Content Filtering Client Policy & Reporting Administrator s Guide

Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6

Dell Compellent Storage Center

Transcription:

Version 9 Active Directory Integration in Progeny 9 1

Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support 2015. Progeny Genetics, LLC, All rights reserved. The information contained herein is proprietary and confidential and is the exclusive property of Progeny Genetics, LLC. It may not be copied, disclosed, used, distributed, modified, or reproduced, in whole or in part, without the express written permission of Progeny Genetics, LLC. Progeny Genetics, LLC has used their best effort in preparing this guide. Progeny Genetics, LLC makes no representations or warranties with respect to the accuracy or completeness of the contents of this guide and specifically disclaims any implied warranties of merchantability or fitness for a particular purpose. Information in this document is subject to change without notice and does not represent a commitment on the part of Progeny Genetics, LLC or any of its affiliates. The accuracy and completeness of the information contained herein and the opinions stated herein are not guaranteed or warranted to produce any particular results, and the advice and strategies contained herein may not be suitable for every user. The software described herein is furnished under a license agreement or a non-disclosure agreement. The software may be copied or used only in accordance with the terms of the agreement. It is against the law to copy the software on any medium except as specifically allowed in the license or the non-disclosure agreement. The name Progeny Genetics, the Progeny Genetics logo, Progeny Clinical, Progeny Lab, and Progeny LIMS are trademarks or registered trademarks of Progeny Genetics, LLC. All other products and company names mentioned herein might be trademarks or registered trademarks of their respective owners. Support is available for Support Plan members who purchase Progeny Clinical, Progeny Lab, or Progeny LIMS and that have an annual support agreement and for trial users. Contact Progeny Genetics, LLC at: 800 Palm Trail Suite 200, Delray Beach, FL 33483 574-968-0822 International 800-776-4369 (US/CAN) support@progenygenetics.com http://www.progenygenetics.com 2

Getting Started The purpose of this document is to assist Progeny administrators in offloading the database authentication process to their organization s directory server using the LDAP protocol. Progeny currently supports both Microsoft Active Directory and Apache Directory systems. This process will replace the local user authentication process used by default within Progeny databases. Active Directory Integration in Progeny 9 To access the LDAP Settings menu within Progeny and configure the LDAP directory connection, log into the Progeny Desktop Client using the progeny Superuser account then while in the Pedigrees, Individuals or Samples modules right-click the folder root and choose the Edit LDAP Settings menu option as seen below: This will open the LDAP Settings menu where administrators can enter the configuration parameters required for Progeny to communicate with the directory server on the local network. If using the Progeny Web Server in conjunction with the Progeny Desktop Client, once the LDAP connection settings are validated and users are able to access the database from the Progeny Desktop Client the Progeny administrator will need to access the Web Configuration Menu of their local Progeny Web Server and change the following setting from 0 to 1 in order to enforce directory authentication instead of local authentication: 3

The following is an annotated screenshot of the LDAP Settings menu a description of each configuration option is listed below options 16-19 and 21 are only required if using the Progeny Web Server: 1. Domain a. This is the FQDN (Fully-Qualified Domain Name) of the domain against which Progeny will authenticate users. 2. Port a. The value of this option will be either 389 (LDAP) or 636 (LDAP/S or LDAP SSL) 3. Username a. This is the directory service attribute which stores the username value Microsoft Active Directory users should use the default AD attribute samaccountname 4. User Object Class a. This is the objectclass attribute value within Microsoft AD user can be entered for this option in nearly all circumstances 5. People Base a. This is the highest common OU (Organizational Unit) folder within the directory schema where the user accounts are located this needs to be entered using proper distinguished name directory notation i. Example: OU=SiteName,OU=Users,DC=Domain,DC=local 4

Options 6-8 are only required if directory groups will be used to assign User Classes within the Progeny database it is not recommended if the Progeny administrator will not have regular access to the domain controller or the ability to alter directory group memberships these options can be left blank if User Class assignments will be controlled from within the Progeny database 6. Group Base a. This is the highest common OU (Organizational Unit) folder within the directory schema where the user accounts are located this needs to be entered using proper distinguished name directory notation i. Example: OU=SiteName,OU=Users,DC=Domain,DC=local 7. Group Object Class a. This is the objectclass attribute value within Microsoft AD for groups group can be entered for this option in nearly all circumstances 8. Group Member Name a. This is the directory attribute where group membership is stored member can be entered for this option in nearly all circumstances 9. Use LDAP groups for Progeny user classes a. This is the active directory groups to be matched with the user classes from Progeny user maintenance 10. Security a. None LDAP communication does not have encryption b. SSL LDAP communication is secured using SSL c. Both Progeny will attempt to communicate using SSL-secured LDAP protocol then fall back to non-secure LDAP protocol if fails 11. Password a. This is an administrative password which prevents LDAP settings from being accidentally changed 12. Bind Type a. Anonymous Local directory server allows for unauthenticated directory searches (this is rarely allowed) b. Standard Local directory server requires directory searches to be performed by an authenticated user/service account with adequate permissions to see all directory tree folders 13. Confirm Password a. Confirmation entry of the password entered in option #11 14. Bind DN a. This is used only when the Standard option is chosen for option #12 b. The full distinguished name of the user account which will perform directory lookups during the authentication process i. Example: CN=username,OU=Users,DC=domain,DC=local 15. Bind Password a. This is used only when the Standard option is chosen for option #12 b. The password for the user account entered in option #14 5

16. Web Server Address a. IP address or FQDN of Progeny Web Server 17. Web Server Port a. Configured access port of Progeny Web Server this is generally either port 80, 443, 8080 or 8443 18. Web Security a. None Progeny Web Server does not utilize SSL encryption for incoming connections b. SSL Progeny Web Server utilizes SSL encryption for incoming connections 19. Application Context a. This is the Progeny Web Server application folder name unless the Progeny Web Server has multiple Web Client applications running / can be entered to represent the default ROOT folder. 20. Use LDAP Only a. Once the LDAP connection properties have been entered and tested, check this box to force all login attempts to use directory authentication (still requires the LDAP Login option to be chosen from the Progeny Desktop Client login screen) 21. Connection Name a. This is the Connection Name value of the Progeny Web Client connection string to the Progeny database (what shows up in the Connection dropdown on the Progeny Web Client login page) 6