The connection status of each LDAP server is displayed in column [Status].
Green dot:
The connection to the LDAP server is established.
Orange dot:
The connection to the LDAP server is not checked or the connection is being checked.
After a reboot of the system, the dots are orange. Click [Test connection] to update the state of each LDAP server.
Red dot:
The connection to the LDAP server cannot be established. Check the settings of the LDAP server.
Additional actions |
Description |
---|---|
Test the connection |
Click [Test connection] to test the connection to the selected LDAP server. The connection status of each LDAP server is displayed in column [Status]. The following checks are done:
|
Refresh the LDAP information |
Click [Refresh] to refresh the generic info about the LDAP, users and groups part of that LDAP. PRISMAdirect stores some information about each LDAP locally. The information regards generic info about the LDAP, users and groups part of that LDAP. In order for it to be in sync with the real information, a service synchronizes this information automatically once a day, at midnight. If you want to synchronize this information manually, you have to use the [Refresh] functionality which starts an update of the information stored for all the LDAP servers. |
You can use LDAP servers for authentication and to retrieve user data. An LDAP server can be used for Windows authentication of users.
Click [System] - [Connectivity] - [LDAP server] - [LDAP servers].
Click [Add] or click on the bar of the LDAP server that you want to configure. The bar expands and you can fill in the required settings.
Setting |
Description |
---|---|
[Domain name for LDAP server:] |
You can define a custom name for the LDAP server. The custom name must be unique. |
[Credentials policy:] |
The JDF Framework service uses these credentials to connect to the LDAP server.
|
[Server address:] |
Type the address of the LDAP server. If you define only the address of the LDAP server, the users are searched through the entire LDAP server. You can also define the server address and the search root. When you define the server address and the search root, the search for users starts at the defined root on the server. For example: LDAP://sro.company.net:389/DC=sro,DC=company,DC=net, where:
|
[Server type:] |
Select a server type. The server types which start with “Native…” are preferred. The other server types are available for backwards compatibility. |
[Use secure connection (SSL)] |
Select this option if you want to create a secure connection to the LDAP server. You must update the port number in option [Server address:] when you want to use a secure connection. The default port number for a non-secure connection is 389. The default port number for a secure connection is 636. To be able to select this option, the LDAP server has to support this. |
[User filter:] |
A default user filter is created automatically when the LDAP server is used for authentication or to retrieve user data. Only users that pass the filter can be imported from the LDAP server. You can edit the filter. The minimum filter is the LDAP attribute for user name, for example: (sAMAccountName=%u). The user filter must contain "%u" as placeholder for the user name. The minimum filter will always work, but it is not time efficient. The filter must be updated when the [LDAP attribute for user name:] is changed. |
[LDAP attribute for user name:] |
You can define the LDAP attribute that contains the user name. The default LDAP attribute is used for the user name if this field is left empty. The default LDAP attribute depends on the server type. |
[User group filter:] |
A default user group filter is created automatically when the LDAP server is used for authentication or to retrieve user data. Only user groups that pass the filter can be imported from the LDAP server. You can edit the filter. The minimum filter is the LDAP attribute for group name, for example: (cn=%g). The user group filter must contain "%g" as placeholder for the user group name. The minimum filter will always work, but it is not time efficient. The filter must be updated when the [LDAP attribute for group name:] is changed. |
[LDAP attribute for group name:] |
You can define the LDAP attribute that contains the group name. The default LDAP attribute is used for the group name if this field is left empty. The default LDAP attribute depends on the server type. |
[Authentication used to connect to LDAP server:] |
You can define the type of authentication which the application uses to connect to the LDAP server. See Authentication types |
[Authentication used to connect user to the LDAP server:] |
You can define the type of authentication which the application uses to authenticate a user on the LDAP server. See Authentication types |
Allow automatic creation of users: |
Every user who logs on to the application with a user name and password known by the LDAP server is created automatically. The [User type] of an automatically created user becomes:
An automatically created user belongs to the group of [Customers]. The users in the [Customers] group can access the web shops. |
[Separator for multi-valued attributes:] |
The LDAP attributes can contain multiple values. Therefore, you have to define a separator to read each separate value correctly. In the [Product and order editor] workspace, you can create lookup items to read information from an LDAP server. Both the lookup item and the LDAP server must use the same separator. Else, the lookup item cannot return multiple values of an LDAP attribute correctly. |
Click [Save].
For each LDAP server, you can map information available in the LDAP server to the [Profile settings] of the customers. The precondition is that the LDAP server is used to retrieve user data. The [Profile settings] of the customers then automatically receive the data from the LDAP server.
If the LDAP attribute contains a value, the associated profile attribute is filled in. The customer cannot change the profile attribute.
If the LDAP attribute does not contain a value, the associated profile attribute is left empty. The customer must define the value of the profile attribute.
If you deselect a profile attribute, the user can change the value of the profile attribute.
Click [System] - [Connectivity] - [LDAP server] - [LDAP servers].
Select an LDAP server and scroll to section [Edit profile mappings].
Type an LDAP attribute for each enabled profile attribute.
The LDAP attributes may not be present in all the LDAP servers or might not contain relevant information.
Click [Save].
Check that the LDAP server is used to retrieve user data.
When the LDAP server is used to retrieve user data, the profile attributes receive the value of the mapped LDAP attribute.
Click [System] - [Connectivity] - [LDAP server] - [Authentication & user data].
If required, drag and drop the LDAP server into field [Servers used to retrieve user data:].
Click [Save].
You can map LDAP attributes to order items. When the LDAP server is used to retrieve user data, the order items receive the value of the mapped LDAP attribute.
Click [Add].
Select an order item from the drop-down list.
Type the LDAP attribute that contains the information that you want to use for the order item.
Do this for all order items that you want to map to LDAP attributes.
Click [Save].