https://<nwservername.domain.com>:9090/nwui
Name: | A Name for the external authority provider, this can be set as per your naming standards. |
Server Type: | LDAP: Select LDAP when the Authentication server is Linux based. Active Directory: Select this option with Microsoft Active Directory is used. LDAP Over SSL (LDAPS): Select this when the authentication server is LDAP but SSL is required. AD Over SSL (LDAPS): Select when Microsoft Active Directory is used, but SSL is required.
Note: LDAP OR AD over SSL requires the certificate to be manually imported to the Auth Trust Store to ensure secure communication. For more information, see NetWorker: How to configure "AD over SSL" (LDAPS) from The NetWorker Web User Interface (NWUI)
|
Provider Server Name: | Specify the IP Address or FQDN of the authentication service provider winsrvhost (AD or LDAP server). |
Port: | If non-SSL then port 389 is used, if SSL then port 636 is used. This field should auto-populate from server type selection. |
Tenant: | *Optional: You can create multiple tenants to serve different authentication providers. For most use cases, default is fine. |
Domain | The domain value for your service provider |
User Distinguished Name (DN) | Specify the DN of the AD or LDAP bind account; excluding the DC values. |
User DN Password | Specify the password of the bind account user. |
nsraddadmin -e "AD_DN"Example:
PS C:\Users\Administrator.AMER> nsraddadmin -e "CN=NetWorker_Admins,DC=amer,DC=lan" 134751:nsraddadmin: Added role 'CN=NetWorker_Admins,DC=amer,DC=lan' to the 'Security Administrators' user group. 134751:nsraddadmin: Added role 'CN=NetWorker_Admins,DC=amer,DC=lan' to the 'Application Administrators' user group.
tenant-name\domain.name\user-name
if the default tenant is used you only must specify domain.name\user-name
.Get-ADUser -Identity AD_USERNAME -Properties DistinguishedName,MemberOfExample:
PS C:\Users\Administrator> Get-ADUser -Identity bkupadmin -Properties DistinguishedName,MemberOf DistinguishedName : CN=Backup Admin,CN=Users,DC=amer,DC=lan Enabled : True GivenName : Backup MemberOf : {CN=NetWorker_Admins,DC=amer,DC=lan} Name : Backup Admin ObjectClass : user ObjectGUID : f37f3ef5-3488-4b53-8844-4fd553ef85b2 SamAccountName : bkupadmin SID : S-1-5-21-3150365795-1515931945-3124253046-9605 Surname : Admin UserPrincipalName : bkupadmin@amer.lanBoth the User's user DN and group DN appear for the AD groups that they belong to.
authc_mgmt -u Administrator -e query-ldap-users -D query-tenant=TENANT-NAME -D query-domain="DOMAIN.DOMAIN"
authc_mgmt -u Administrator -e query-ldap-groups-for-user -D query-tenant=TENANT-NAME -D query-domain="DOMAIN.DOMAIN" -D user-name=AD-USERNAME
nve:~ # authc_mgmt -u Administrator -e query-ldap-users -D query-tenant=default -D query-domain="amer.lan" Enter password: The query returns 19 records. User Name Full Dn Name .... bkupadmin CN=Backup Admin,CN=Users,dc=amer,dc=lan nve:~ # authc_mgmt -u Administrator -e query-ldap-groups-for-user -D query-tenant=default -D query-domain="amer.lan" -D user-name=bkupadmin Enter password: The query returns 1 records. Group Name Full Dn Name NetWorker_Admins CN=NetWorker_Admins,dc=amer,dc=lan