LDAP authentication includes support for secure LDAP and integration into the AMM that allows a remote user group to be configured.
This remote user group is configured using a service account with limited permissions, which allows the AMM to authenticate with the remote directory server.
The user will login to the AMM specifying the remote user group and their LDAP credentials. The AMM will validate the username and password combination with the directory server that was specified in the remote user group. If the directory server is able to correctly validate the user credentials, then access to the AMM will be granted.
The following subsections provide information on how to setup LDAP.
The requirements for setting up LDAP are as follows:
The limitations are as follows:
If there are existing LDAP users, then the following directions should be incorporated into the upgrade process when upgrading to AM/AMM 2.17.5.
Before any LDAP remote user can login into AMM, it is necessary to configure the AMM to be able to authenticate with a remote LDAP server. This configuration is done by adding a new remote user group on the system, under the Admin > User Management > Users screen.
This remote user group will store the LDAP server information, such as ip-address, port, etc. It will also store privileges and preference settings that will be used for incoming remote users.
Remote Server Identification
Show Status Information:
Customer Group: Select the AMM customer group that the remote user will belong to. This group contains the gateways that the remote user will have access to on the AMM.
Remote User’s Expiry Date: The date for when the remote user group will no longer be able to login to the AMM.
Note: When an expiry date is set for the remote user group, then all remote users that are part of this remote user group will have this expiry date.
A Remote User Group must have at least one server entry, otherwise the change will not be saved.
The order in which the LDAP servers are entered, is the order in which they will be saved. Initially the active server will be the first one saved. The active LDAP server is indicated by the LDAP Server in Use label. If it has a green square besides this label, then communications and authentications to the LDAP server from the AMM was working when last tried.
E.g. This example shows that the ldap server openldaptest1.test.airlink.com is the active server and that its last communication from the AMM to the ldap server was successful as indicated by the green square. The Last Server Failure shows there was a communication failure at that date/time, but since then the green shows that the failure has cleared.
Whenever there is a failure of communication (i.e. connection timeout), the square besides the LDAP Server in Use will turn red. The next server in the list will be tried. If it is able to perform a successful authentication or receives a authentication failure such as user using wrong credentials, then the server will be designated the active one and the square besides the LDAP Server in Use will turn green. If it fails with a communication timeout, it will continue the same process for each server in the list until it reaches the last server. If the last server fails, it will retry from the top of the list. The Last Server Failure under the Show Status Information will be updated with the date/time of the communication failure for each failed server.
If a user wants to login to the AMM using a remote user id, then the following pattern must be used in the User Name field of the login screen.
{remote user group name}/{ldap user name}
E.g.
The AMM will use this information to retrieve the LDAP server information and the credentials will be authenticated on the LDAP server.
Once logged in as a remote user, any reference to User will display in the format {ldap_user_group}/{userid}.
Configure an AMM for LDAP user authentication:
If the administrator deletes the Remote User Group, all associated remote users with an active session will be automatically logged out and no longer able to log back in. A warning popup will show to confirm that this is the desired action.
If the administrator changes any settings in the Remote User Group record, any remote users associated to that Remote User Group record will be automatically logged out, and prompted to login again. A warning popup will show to confirm that this is the desired action.
If the Remote User Group Name is changed, the remote user will need to login using the new Remote User Group Name.
When a Remote User Group is created, modified or deleted, an entry will be logged in the Admin > User Management > User Activity.
Event |
Created remote user group ldap_user_group |
Modified remote user group ldap_user_group |
Deleted remote user group ldap_user_group |
Any actions taken by a remote user will be logged in the User Activity identified under the User column as {ldap_user_group}/{userid}.