LDAP
ODD Platform can be configured to use existing LDAP server for users authentication. There are several properties, that need to be set in order to enable this kind of security.
Define authentication type
Connect to LDAP server
There are 3 properties, which are responsible for connecting to LDAP server
auth.ldap.url
: LDAP server url (required)auth.ldap.username
: The username (principal) to use when authenticating with the LDAP serverauth.ldap.password
: The password (credentials) to use when authenticating with the LDAP server
Username and password are not required. If they are not set, operations will be performed by using an anonymous (unauthenticated) context
Perform users search
There are 2 ways of how to retrieve users in LDAP server.
Define DN pattern of user names. This is great, when all users are stored under a single node in a directory.
Setup LDAP search filter.
DN pattern
This is an example of how user DN pattern can be defined. In this case DN for the user will be built by substituting login in the supplied pattern instead of 0.
Search filter
This is an example of using search filter instead of DN pattern. If a user search base isn’t supplied, the search will be performed from the root.
It is required to set up one of those search methods, otherwise application start will fail
Define admin groups
ODD platform can get LDAP groups, which user is belongs to. Thus it is possible to define, which groups will grant admin priviligies. There are several properties, that need to be set in order to allow ODD platform to do this:
auth.ldap.groups.search-base
: The base DN from which the search for group membership should be performed. By default it will be performed from the root.auth.ldap.groups.filter
: The pattern to be used for the user search. Default value is(member={0})
, where user DN will be placed instead of 0.auth.ldap.groups.admin-groups
: List of groups, which members will be granted admin permissions.
Active directory
If you are using Active Directory as LDAP server there are additional properties, that need to be set
auth.ldap.active-directory.enabled
: Must be set totrue
auth.ldap.active-directory.domain
: Domain name
Final configuration example
Last updated