Difference between revisions of "Template:LDAP Server Config"
IVSWikiBlue (talk | contribs) |
IVSWikiBlue (talk | contribs) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
− | {{Article | content = | + | __TOC__ |
+ | {{Article | title = LDAP Server Config | content = | ||
==Connecting to the LDAP Server== | ==Connecting to the LDAP Server== | ||
#Navigate to the VALT software either through the IP Address or the FQDN using Chrome, Firefox, or other standard web browser | #Navigate to the VALT software either through the IP Address or the FQDN using Chrome, Firefox, or other standard web browser |
Latest revision as of 16:16, 27 March 2024
Contents
LDAP Server Config
Connecting to the LDAP Server
- Navigate to the VALT software either through the IP Address or the FQDN using Chrome, Firefox, or other standard web browser
- Log into VALT, web interface, with Admin access.
- Click on Admin -> Users & Groups -> LDAP -> Show Advanced Settings
- Scroll down to Servers
A: Enter the IP Address or FQDN of your Active Directory or other LDAP compatible server in the Server field.
✎Note: I: If you are using LDAPS, enter the IP or FQDN as ldaps://myldapsserver.com
' II: If you are using a Global Catalog Server then it needs to be written as myldapserver.com:3268
III: If you are using a Global Catalog Server with LDAPS, then it needs to be formatted as ldaps://myldapserver.com:3269
B: Enter a Service Account user with read access in the LDAP Bind User field
✎Note: The user must be entered as user@domain.com
C: Enter the Service Account password
Note: Our password requirements do not allow for the use of these reserved characters: ! * ' ( ) ; : @ & = + $ , / ? % # [ ]
D: Enter in the Base DN of the Service Account
Note: Base DN must be entered in the form of DC=ad,DC=ipivs,DC=com
E: Select either Active Directory or Open LDAP
F: >Click Save
- If the credentials were accepted and a connection was established, you will receive a message stating connected and you will see your LDAP Server in Green:
Syncing Security Groups
- To sync users accounts, navigate to Sync Schedules
- Once here, start entering in the following information:
- Test that the user import worked:
Note: If the import failed, and you have users assigned to a group, most likely either your Bind Script in the Sync Schedule block or the Base DN/LDAP Bind User in the Server block are entered incorrectlyImporting an Individual User
- Navigate to the User Import section:
- Enter in the information:
- You will see a confirmation message displayed that the user has been imported and you can verify the user got assigned to the group:
</div></div>