Type the hostname or IP address of the
identity provider. A protocol prefix is not required.
Secure Connection
Select this attribute if the
identity provider uses a secure connection method such as LDAPS or AD over SSL. Selecting this attribute enables the certificate validation controls.
Port
Type the port number for the
identity provider.
Domain
Type the domain for which this
identity provider authenticates users. For example,
ldap.example.com.
User Name
Type a user account that has full read access to the directory. A domain is not required.
Password
Type the password for the specified user account.
Group Search Attribute
Type the attribute name that the
identity provider should use to validate the group name in the hierarchy.
Group Member Attribute
Type the attribute name that the
identity provider should use to validate the group member in the hierarchy.
Group Search Base
If searches should not start from the default base, type the name of a base from which searches should start. For example, if the domain is
ldap.example.com, type
admin to start searches from
admin.ldap.example.com. Otherwise, leave this attribute empty. Only a single search base is supported.
Populate the default values from this table into the appropriate fields when indicated:
For unsecure connections, the default port number is 389.
For secure connections, the default port number is 636.
Group Search Attribute
sAMAccountName
cn
Group Member Attribute
member
memberUid
If you selected a secure connection method:
Click
Verify.
In the
Verify Certificate window, verify the details of the
identity provider TLS certificate and then click
Accept.
NOTE When you specify the LDAPS protocol,
PowerProtect Data Manager automatically downloads the certificates required to connect to the
identity provider. Once downloaded, the
Certificate Validation field appears. Click
Verify to compare the displayed certificate information with the expected certificate information. If the certificates match, click
Accept to continue with the setup. Otherwise, click
Cancel to cancel the setup.
Click
Save.
Next steps
Assign
identity provider groups to a role. The section
Add identity provider group-to-role mapping provides instructions. You cannot log in as an external user without mapping users or groups to roles.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\