Importing Users from LDAP
(This procedure is applicable prior to build 6310)

LDAP (Lightweight Directory Access Protocol) is a widely used standard protocol for accessing and managing directory services that provide a standardized approach to storing and retrieving information about users, devices, and other network resources. In PAM360, you can now integrate your organization's LDAP servers and import users of your organization. Post importation, you can manage their privilege to the respective resources available in the organization.

Similar to importing users from file, AD and Microsoft Entra ID, you can also import users from LDAP directory. Read further to know how.

Steps Required

There are three steps involved in importing users from an LDAP directory.

  1. Importing Users from LDAP
  2. Specifying Appropriate User Roles
  3. Enabling LDAP Authentication

Navigate to Admin >> Authentication >> LDAP. The LDAP Server Configuration page is displayed.

1. Importing Users from LDAP

The first step is to provide the required credential details and import users from LDAP. To do this:

  1. Click the Import Now button from the LDAP Server Configuration page . Alternatively, you can also access this from Users >> Import from LDAP button.
  2. In the pop-up form that pops-up, fill-in the details as required:

    1. You can configure the connection between LDAP Server and PAM360 to be over an encrypted channel (SSL) or Non-SSL. If you choose, SSL mode, do the following. Otherwise, proceed to Step 2.
      • To enable the SSL mode, the LDAP server should be serving over SSL in port 636 and you will have to import the LDAP server's root certificate, LDAP server's certificate and all other certificates that are present in the respective root certificate chain into the PAM360's server machine's certificate store.
      • To import certificates, open a command prompt and navigate to <PAM360_SERVER_HOME>\bin directory and execute the following command:

      For Windows:

      importCert.bat <Absolute Path of certificate>

      For Linux:

      importCert.sh <Absolute Path of certificate>

      Restart PAM360 server. Then, continue with the following steps.

    2. Enter the url of the LDAP provider in the format attribute://ldap server host:port (Example ldap://192.168.4.83 <:389/)
    3. Enter the credentials of any one of the user already present in LDAP for authentication. It should be in the format of how the user would have submitted their username when authenticating to your application. For example, a typical entry would look something like: cn=Eric,cn=Users,o=adventnet,c=com.
    4. Enter the password of the user.
    5. This is the 'base' or 'root' from where directory lookups should take place. Enter the LDAP base (top level of the LDAP directory tree). Enter it exactly in the format used in your LDAP. No spaces are allowed between the commas or the '=' equal symbol and entries that are case sensitive.
    6. If you want to add only specific users from your LDAP directory, just perform a search using the appropriate search filter. For example, for adding only those users who belong to the category "Managers", a typical search filter would be like: ou=Managers,ou=Groups,o=adventnet,c=com.
    7. Enter the group name. While importing users from LDAP, PAM360 will automatically create a user group with all the imported users. If you enable synchronization, the user group will get synchronized based on the search filter created by you.
    8. Select your LDAP server type
      • Microsoft Active Directory (or)
      • Novell eDirectory (or)
      • OpenLDAP (or)
      • Others
    9. If your LDAP server belongs to the type Microsoft Active Directory/Novell eDirectory/OpenLDAP, you can select that type and click Save.

If your LDAP server belongs to types other than Microsoft Active Directory/Novell eDirectory/OpenLDAP, specify the following additional details to authenticate the users:

  1. Enter the user login attribute in your LDAP structure in the text field for "Login Attribute". For instance, for LDAP making use of AD, the entry would be "sAMAccountName" and for OpenLDAP, the entry would be "uid". If you are using any other LDAP, make this entry in accordance with your LDAP structure.
  2. Enter the e-mail attribute for the users in your LDAP structure in the text field for "Mail Attribute". For instance, for LDAP making use of AD, the entry would be "mail". If you are using any other LDAP, make this entry in accordance with your LDAP structure.
  3. Enter the distinguished name attribute - that is the LDAP attribute that uniquely defines this object. For instance, for LDAP making use of AD, the entry would be "distinguishedName" and for OpenLDAP, the entry would be "dn". If you are using any other LDAP, make this entry in accordance with your LDAP structure.
  4. Click "Import". Soon after hitting this "Save" button, PAM360 will start adding all users from LDAP. During subsequent imports only the new users entries in LDAP are added to the local database. During import, every user will be notified through email about their account, along with a password that will be used to login to PAM360 when LDAP authentication is disabled.

1.1 Configure Synchronization and Manage LDAP Server Details

Whenever new users get added to the LDAP, there is provision to automatically add them to PAM360 and keep the user database in sync. This can be done from the 'LDAP Server Details' page. Click the button 'LDAP Server Details' under Step 1 in the UI. This UI has been designed to serve as a one-stop place for managing all configurations pertaining to the LDAP servers integrated with PAM360.

  1. In the LDAP Server Details UI, you can view the list of LDAP servers already integrated, integrate new LDAP servers, delete existing ones, edit entries and manage the entries pertaining to the LDAP servers.
  2. In addition, from the Actions section of this page,
    • You can edit the existing LDAP server details.
    • You can configure user database synchronization. Enter the time interval at which PAM360 has to query the LDAP server to keep the user database in sync. The time interval could be as low as a minute or it can be in the range of hours/days.
    • You can also import users from LDAP.

2. Specifying Appropriate User Roles

All the users imported from LDAP will be assigned the 'Password User' role by default. To assign specific roles to specific users,

  1. Go to Step 2 in the UI (Admin >> Authentication >> LDAP) and click Assign Roles Now.
  2. In the pop-up form that opens, all the Users imported from AD are listed.
    1. Click Change role button against desired users for whom you wish to change the role and select the appropriate role from the drop down.
    2. Click Save and the required roles are set for the users.

3. Enabling LDAP Authentication

The final step is to enable LDAP authentication. This will allow your users to use their LDAP directory password to log in to PAM360. Note that this scheme will work only for users who have been already imported to the local database from AD.

Note: Make sure you have at least one user with the 'Administrator' role, among the users imported from LDAP.

 

Top