Type the hostname or IP address of the
identity provider. A protocol prefix is not required.
Secure Connection
Only secure connection is supported in DM5500.
Port
Type the port number for the
identity provider.
Domain
Type the domain for which this
identity provider authenticates users. For example,
ldap.example.com.
User Name
Type a user account that has full read access to the directory.
Password
Type the password for the specified user account.
Group Search Attribute
This is a read only field, with this value
userPrincipleName.
Group Member Attribute
Type the attribute name that the
identity provider should use to validate the group member in the hierarchy.
Group Search Base
If searches should not start from the default base, type the name of a base from which searches should start. For example, if the domain is
ldap.example.com, type
admin to start searches from
admin.ldap.example.com. Otherwise, leave this attribute empty. Only a single search base is supported.
Populate the default values from this table into the appropriate fields when indicated:
For secure connections, the default port number is 636.
Group Search Attribute
userPrincipleName
Group Member Attribute
member
If you selected a secure connection method:
Click
Verify.
In the
Verify Certificate window, verify the details of the
identity provider TLS certificate and then click
Accept.
NOTE:When you specify the LDAPS protocol,
Data Manager Appliance automatically downloads the certificates required to connect to the
identity provider. Once downloaded, the
Certificate Validation field appears. Click
Verify to compare the displayed certificate information with the expected certificate information. If the certificates match, click
Accept to continue with the setup. Otherwise, click
Cancel to cancel the setup. There are some pre-requisites for LDAP registration with DM5500 as summarized:
Only a secured AD is supported in DM5500.
Ensure to create a certificate that has the subject common name synchronized with the domain controller hostname.
Ensure to have LDAP DNS in sync to authenticate LDAP.
Primary groups in LDAP group role mapping is not supported.
Click
Save.
Next steps
Data Manager Appliance only supports mapping groups to roles but not mapping users to roles.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\