Authentication Tab (LDAP Double Bind)

The Lightweight Directory Access Protocol (LDAP) is a protocol for querying, and modifying, directory services. The Administrator can configure the server to use either simple-bind or double-bind authentication.

Authentication Type: LDAP Double Bind

Login URL: Enter the URL to log in to Unifier.

Provider: To connect the LDAP server (URL), for example, ldap://ldap.zyz.com:636

SSL: To connect to the Secure Sockets Layer (SSL) enabled port of the LDAP server.

When Unifier is configured with JDK 8 and integrated with LDAP SSL:

The above settings enable you to log in using LDAP SSL.

Example

Setting in setenv.sh file: export JAVA_OPTIONS="$JAVA_OPTIONS

-Djdk.tls.clent.protocols=TLSv1"

Provider Base: (Optional) When you select the Double Bind method of authentication, you need to find the user's DN and then authenticate them. Finding the user's DN is used as the base for searching the LDAP tree. If the Provided Base is not set, the root is assumed by the system: ldap.provider.base

Authorized User: When using the Double Bind method of authentication, find the user's Distinguished Name (DN) and then authenticate. This is used as the "trusted" or "search" login user's DN (first bind).

Authorized User Password: When using the Double Bind method of authentication, this is the authorized user's login password.

Search Field: The default value is "cn." You need to enter the node field that you want to search.

Admin User Bypass: To allow the administrator bypass the LDAP login.

Test User Name (not Saved): Enter the LDAP user name to test the LDAP server.

Test User Password (not Saved): Enter the LDAP password to test the LDAP server.



Last Published Tuesday, February 20, 2024