Configure LDAP
Configure LDAP (Lightweight Directory Access Protocol) for users accessing OpsCenter.
LDAP configuration is extremely flexible with many configuration options possible within OpsCenter. To peruse all of the available [ldap] configuration options, see OpsCenter configuration properties. This procedure provides a basic configuration example to authenticate a user based on searching for a user in both user and group categories.
Prerequisites
There must be a properly configured LDAP v3 server running. The supported LDAP servers are:
-
Microsoft Active Directory:
-
Windows 2008
-
Windows 2012
-
-
OpenLDAP 2.4.x
-
Oracle Directory Server Enterprise Edition 11.1.1.7.0
Additional requirements:
-
If your organization started with standard OpsCenter authentication and subsequently switched to implementing LDAP, delete the old passwd.db file.
-
Roles: If using LDAP groups, create and mirror in OpsCenter the user role names and permissions that are in LDAP. Role permissions are stored in OpsCenter, not LDAP. Users must have at least one role to be able to log in to OpsCenter when LDAP is enabled.
Procedure
-
Locate the
opscenterd.conffile. The location of this file depends on the type of installation:-
Package installations:
/etc/opscenter/opscenterd.conf -
Tarball installations:
INSTALL_DIRECTORY/conf/opscenterd.conf
-
-
Open the
opscenterd.conffile for editing. -
Add an
[authentication]section with the following options:Option Description password_dbContains the required OpsCenter user role information. The default directories are as follows:
-
Package installations:
/usr/share/opscenterwheresqlite3.dbis stored -
Tarball installations:
install_directory/passwd.db
enabledSet to
Trueto enable LDAP authentication.authentication_methodSet to
LDAP, regardless if configuring Active Directory.Example of an
[authentication]section:[authentication] password_db = ./passwd.db enabled = True authentication_method = LDAP
-
-
Set the configuration for your LDAP server. Add an
[ldap]section toopscenterd.confwith the following LDAP server options as appropriate for your LDAP implementation.
Additionally, see the Example to understand an SSL LDAP configuration versus an Active Directory configuration.
+ .LDAP server options
| Option | Description | ||
|---|---|---|---|
server_host |
The host name of the LDAP server. |
||
server_port |
The port on which the LDAP server listens. For example, 389 or 636. * 389 is the default port for non-SSL LDAP and AD. * 636 is the default port for SSL LDAP and AD. For more information about ports, see OpsCenter ports. |
||
hostname_verification |
Sets whether hostname verification should happen for SSL/TLS connections.
|
||
uri_scheme |
In LDAPv2 environments, TLS is normally started using the LDAP Secure URI scheme instead of the normal LDAP URI scheme. OpenLDAP command line tools allow either scheme to be used with the |
||
search_dn |
The username of the user that is used to search for other users on the LDAP server. When a user attempts to authenticate with LDAP, OpsCenter searches for the user in LDAP to discover whether the user exists and which roles the user is associated with. The only permission that the search user needs to have in the LDAP system is the ability to perform LDAP searches.
|
||
search_password |
The password of the |
||
The search base for your domain, used to look up users. Set the |
|||
user_search_filter |
The LDAP search filter used to uniquely identify a user. The default setting is
|
||
group_search_base |
The LDAP search base used to find a group. Example: |
||
group_search_filter |
Deprecated. The LDAP search filter used to find a user’s group. Example: (member=cn={0},ou=users,dc=nodomain). Within the group_search_base, filter for members based on |
||
group_search_filter_with_dn |
The LDAP search filter that is used to find a user’s group. Uses the full user’s 'DN' from a user search. Overrides the deprecated |
||
group_name_attribute |
The LDAP field name used to identify a group’s name. For example: |
||
admin_group_name |
The name of the admin group or a comma-separated list of admin group names; for example: |
||
user_memberof_attribute |
Set to the attribute on the user entry containing group membership information. Set this option when using a OpsCenter allows for an alternate method of determining a user’s role. When using memberof_search, rather than doing a directory search in LDAP for any roles that match the user, only the user is inspected. You can specify which attribute for a user is inspected. For example, you can define a user with a new attribute such as |
||
group_search_type |
Defines how group membership is determined for a user. Available options: * |
||
user_memberof_stores_dn |
Set to Default: False. Set
|
||
ldap_security |
The type of security to use with LDAP: None, TLS, or SSL. When set to TLS, uses TLS start. Setting this option to TLS or SSL sets the uri_scheme to LDAPS. Setting this option to None sets the uri_scheme to LDAP. |
||
truststore |
Path to the truststore for SSL certificates. |
||
truststore_type |
Type of the truststore. Default: JKS (Java Keystore). |
||
truststore_pass |
The password to access the truststore. |
||
enforce_single_user_search_result |
Returns an error when multiple entries are returned from a user search after all applicable referrals are followed. Set to False if the user_search_base is not confined to one Organizational Unit (OU). Default: True. |
||
connection_timeout |
The number of seconds to wait before concluding that the LDAP server is down. Default: 20 seconds. |
-
Restart OpsCenter for the changes to take effect.
Example
SSL LDAP (OpenLDAP or Oracle) implementation
The following example configuration reflects a typical SSL LDAP (OpenLDAP or Oracle) implementation. The server_port value of 636 is for an SSL configuration.
If the search_dn and search_password options shown in lines 11 and 12 are omitted, LDAP attempts to make an anonymous bind to perform the user search.
This configuration example searches for a user in both user (user_search_base and user_search_filter) and group (group_search_base and group_search_filter) categories to authenticate a user. The group_search_type (line 19) is directory_search.
|
The |
01 [authentication]
02 password_db = ./passwd.db
03 enabled = True
04 authentication_method = LDAP
05
06 [ldap]
07 server_host = ldap.myCompany.lan
08 server_port = 636
09 hostname_verification = true
10 uri_scheme = ldaps
11 search_dn = cn=admin,dc=devldap,dc=datastax,dc=lan
12 search_password = **
13 user_search_base = ou=users,dc=devldap,dc=datastax,dc=lan
14 user_search_filter = (uid={0})
15 #user_search_base = CN=search,CN=Users,DC=datastax,DC=internal # AD base
16 #user_search_filter = (sAMAccountName={0}) # AD filter
17 group_search_base = ou=users,dc=devldap,dc=datastax,dc=lan
18 group_search_filter_with_dn = (member={0})
19 group_name_attribute = cn
20 group_search_type = directory_search
21 admin_group_name = superusers,superusers2
22 ldap_security = SSL_TLS
23 truststore_type = JKS
24 truststore = ./truststore.jks
25 truststore_pass = secret
Active Directory (AD) for Windows 2008 implementation
The following example reflects an Active Directory (AD) for Windows 2008 configuration. Unlike the previous LDAP example for OpenLDAP or Oracle, this AD configuration makes use of user_search_base (line 13) and user_search_filter (line 14) for Active Directory configuration options. Also, the user search base for AD shown in line 13 differs in format from the LDAP example.
The user_memberof_stores_dn option in line 19 is explicitly set to True so that OpsCenter correctly handles the value of the memberof_attribute shown in line 18 as a distinguished name (DN). The user_memberof_stores_dn option is also applicable to an OpenLDAP configuration.
01 [authentication]
02 password_db = ./passwd.db
03 enabled = True
04 authentication_method = LDAP
05
06 [ldap]
07 server_host = mywin2008.myCompany.lan
08 server_port = 636
09 hostname_verification = true
10 uri_scheme = ldap
11 search_dn = CN=Administrator,CN=Users,DC=prodwin2008,DC=datastax,DC=lan
12 search_password = **
13 user_search_base = CN=Users,DC=prodwin2008,DC=datastax,DC=lan # AD base
14 user_search_filter = (sAMAccountName={0}) # AD filter
15 admin_group_name = superusers
16 group_search_type = memberof_search
17 group_name_attribute = cn
18 user_memberof_attribute = memberof
19 user_memberof_stores_dn = True
20 ldap_security = SSL_TLS
21 truststore_type = JKS