![ldap query user distinguished name ldap query user distinguished name](https://cwiki.apache.org/confluence/download/attachments/32826/searchSofterra.png)
If you use organizational units to manage users, create separate auth modules for each organization. The value entered in this field is added to the LDAP URL and cannot contain unsafe characters. For example, if your company uses the domain, enter the top-level LDAP DN dc=mycompany,dc=com. For instructions, see Trusted SSL Certificates.Įnter the domain components that define the top-level LDAP DN where user accounts are stored. Before you can establish a secure connection, you need to import the trusted SSL certificate for your LDAPS server. The default port for standard LDAP is 389.Įnable this option to connect to the directory service over SSL. For a connection over SSL, change the protocol part of the address to ldaps.Įnter the number of the port used to communicate with the directory service. In the New Module dialog, enter values for the following settings:Įnter a name for the authentication module.Įnter the server address of the directory service. In the Access Management section of the Administration menu, select Auth Modules.įrom the Add Module drop-down list, select LDAP. Requires permissions: Low-level Admin Write To allow users stored in a directory service to log in to Hub, enable an LDAP authentication module. For more information, see Trusted SSL Certificates. Instead, you need to access the Trusted SSL Certificates page and import it there. The option to import a trusted SSL certificate is not supported in the settings for the LDAP authentication module.
![ldap query user distinguished name ldap query user distinguished name](https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/1092633849/original/lYpj6CZg9eMn_oSNVs01C2mL9teoXgGAlA.png)
#Ldap query user distinguished name full#
If there are any intermediate certificates that sit between the SSL certificate and the root CA certificate, you need to upload a file that contains the full certificate chain. If you want to connect to the directory service over SSL, import the trusted SSL certificate for your LDAPS server before you enable the authentication module. Users who have been removed from the directory service cannot log in to Hub. When LDAP authentication is enabled, Hub checks the directory service for each login attempt. Hub only creates a user account when an unregistered user first logs in to Hub or a connected service. The LDAP authentication module does not import all of the user accounts from the directory service. You can configure a module to use the standard LDAP scheme or LDAPS over SSL. This authentication module is pre-configured for LDAP. An LDAP authentication module lets users log in to Hub and any connected services with credentials that are stored in a directory service.