Complete the following steps to set up a management module to use the LDAP server:
Extract search domain from login id: The LDAP client uses the domain name in the login ID. For example, if the login ID is joesmith@mycompany.com, the domain name is mycompany.com. If the domain name cannot be extracted from the login ID, the DNS SRV process fails, causing a user authentication failure.
Use only configured search domain below: The LDAP client uses the domain name that is set in the Search Domain field.
Try login id first, then configured value: The LDAP client first attempts to extract the domain name from the login ID. If this succeeds, this domain name is used in the DNS SRV request. If there is no domain name in the login ID, the LDAP client uses the domain name that is set in the Search Domain field as the domain name in the DNS SRV request. If neither of these items is configured, user authentication fails.
The group filter is limited to 511 characters and can contain multiple group names. A colon (:) is used to delimit group names. Leading spaces and trailing spaces are ignored; all other spaces are treated as part of the group name. The asterisk "*" wildcard character is not treated as a wildcard, because the wildcard concept has been eliminated for security. A group name can be specified as a full domain name or using only the company name portion. For example, a group with a domain name equal to cn=adminGroup,dc=mycompany,dc=com can be specified using the actual domain name or by using adminGroup. You must also configure additional authentication attributes as described in Configuring the LDAP search attributes.
Anonymous authentication: A bind attempt is made without a client distinguished name or password. If the bind is successful, a search is requested to find an entry on the LDAP server for the user who is attempting to log in. If an entry is found, a second attempt to bind is attempted, this time with the distinguished name and password of the user. If this succeeds, the user has passed the user authentication phase. Group authentication is then attempted, if it is enabled.
w/ Configured Credentials: A bind attempt is made, using the configured client domain name and password. If the initial bind is successful, a search is performed to find an entry on the LDAP server that belongs to the user who is logging in. If necessary, a second attempt to bind is attempted, this time with the domain name that is retrieved from the user LDAP record and the password that was entered during the login process. If this fails, the user is denied access. When using a binding method of configured credentials, you must configure the credentials as described in Configuring the LDAP client authentication.
w/ Login Credentials: A bind attempt is made, using the credentials that were supplied during the login process. If the initial bind is successful, a search is performed to find an entry on the LDAP server that belongs to the user who is logging in.
Depending on the LDAP configuration that you have set, click the options to set the domain names and passwords that are used for client authentication and the LDAP client search attributes. Each of these options is described in the following sections.