Importing Users from LDAP
There are three steps involved in importing users from an LDAP directory.
To begin, navigate to Admin >> Authentication >> LDAP. The LDAP Server Configuration page is displayed.
Step 1 - Importing Users from LDAP
- Click the Import Now button from the LDAP Server Configuration page . Alternatively, you can also access this from Users >> Import from LDAP button.
- In the pop-up form that pops-up, fill-in the details as required:
- You can configure the connection between LDAP Server and PAM360 to be over an encrypted channel (SSL) or Non-SSL. If you choose, SSL mode, do the following. Otherwise, proceed to Step 2.
- Enter the url of the LDAP provider in the format attribute://ldap server host:port (Example ldap://192.168.4.83 <:389/)
- Enter the credentials of any one of the user already present in LDAP for authentication. It should be in the format of how the user would have submitted their username when authenticating to your application. For example, a typical entry would look something like: cn=Eric,cn=Users,o=adventnet,c=com.
- Enter the password of the user.
- This is the 'base' or 'root' from where directory lookups should take place. Enter the LDAP base (top level of the LDAP directory tree). Enter it exactly in the format used in your LDAP. No spaces are allowed between the commas or the '=' equal symbol and entries that are case sensitive.
- If you want to add only specific users from your LDAP directory, just perform a search using the appropriate search filter. For example, for adding only those users who belong to the category "Managers", a typical search filter would be like: ou=Managers,ou=Groups,o=adventnet,c=com.
- Enter the group name. While importing users from LDAP, PAM360 will automatically create a user group with all the imported users. If you enable synchronization, the user group will get synchronized based on the search filter created by you.
- Select your LDAP server type
- Microsoft Active Directory (or)
- Novell eDirectory (or)
- OpenLDAP (or)
- If your LDAP server belongs to the type Microsoft Active Directory/Novell eDirectory/OpenLDAP, you can select that type and click "Save".
To enable the SSL mode, the LDAP server should be serving over SSL in port 636 and you will have to import the LDAP server's root certificate, LDAP server's certificate and all other certificates that are present in the respective root certificate chain into the PAM360's server machine's certificate store.
To import certificates, open a command prompt and navigate to <PAM360_SERVER_HOME>\bin directory and execute the following command:
importCert.bat <Absolute Path of certificate>
importCert.sh <Absolute Path of certificate>
Restart PAM360 server. Then, continue with the following steps.
If your LDAP server belongs to types other than Microsoft Active Directory/Novell eDirectory/OpenLDAP, specify the following additional details to authenticate the users:
- Enter the user login attribute in your LDAP structure in the text field for "Login Attribute". For instance, for LDAP making use of AD, the entry would be "sAMAccountName" and for OpenLDAP, the entry would be "uid". If you are using any other LDAP, make this entry in accordance with your LDAP structure.
- Enter the e-mail attribute for the users in your LDAP structure in the text field for "Mail Attribute". For instance, for LDAP making use of AD, the entry would be "mail". If you are using any other LDAP, make this entry in accordance with your LDAP structure.
- Enter the distinguished name attribute - that is the LDAP attribute that uniquely defines this object. For instance, for LDAP making use of AD, the entry would be "distinguishedName" and for OpenLDAP, the entry would be "dn". If you are using any other LDAP, make this entry in accordance with your LDAP structure.
- Click "Import". Soon after hitting this "Save" button, PAM360 will start adding all users from LDAP. During subsequent imports only the new users entries in LDAP are added to the local database. During import, every user will be notified through email about their account, along with a password that will be used to login to PAM360 when LDAP authentication is disabled.
Configure Synchronization and Manage LDAP Server Details(Feature available only in Enterprise Edition)
Whenever new users get added to the LDAP, there is provision to automatically add them to PAM360 and keep the user database in sync. This can be done from the 'LDAP Server Details' page. Click the button 'LDAP Server Details' under Step 1 in the UI. This UI has been designed to serve as a one-stop place for managing all configurations pertaining to the LDAP servers integrated with PAM360.
- In the 'LDAP Server Details' UI, you can view the list of LDAP servers already integrated, integrate new LDAP servers, delete existing ones, edit entries and manage the entries pertaining to the LDAP servers.
- In addition, from the "Actions" section of this page,
- You can edit the existing LDAP server details.
- You can configure user database synchronization. Enter the time interval at which PAM360 has to query the LDAP server to keep the user database in sync. The time interval could be as low as a minute or it can be in the range of hours/days.
- You can also import users from LDAP.
Step 2 - Specifying Appropriate User Roles
All the users imported from LDAP will be assigned the 'Password User' role by default. To assign specific roles to specific users,
- Go to Step 2 in the UI (Admin >> Authentication >> LDAP) and click the button "Assign Roles Now".
- In the pop-up form that opens, all the Users imported from AD are listed.
- Click "Change role" button against desired users for whom you wish to change the role and select the appropriate role from the drop down.
- Click "Save" and the required roles are set for the users.
Step 3 - Enabling LDAP Authentication
The final step is to enable LDAP authentication. This will allow your users to use their LDAP directory password to log in to PAM360. Note that this scheme will work only for users who have been already imported to the local database from AD.
Note: Make sure you have at least one user with the 'Administrator' role, among the users imported from LDAP.