OIA 11.1.1.5 LDAP Authentication with AD
The actions required to configure an Active Directory to be used as the authentication repository.
dsquery
The first action is to discover the ldapAuthentication.rootContext value (in this example will be the base DN) for within the $OIAHOME/conf/jdbc.properties file. To achieve this, you can use the dsquery function that comes OOTB with Windows Server 2003. To use this, simply type:
dsquery user
You may gets a response like this:
"CN=Administrator,CN=Users,DC=SenaSystems,DC=local"
"CN=Guest,CN=Users,DC=SenaSystems,DC=local"
"CN=SUPPORT_388945a0,CN=Users,DC=SenaSystems,DC=local"
"CN=OIMUser,CN=Users,DC=SenaSystems,DC=local"
"CN=David Davids,OU=anotherOU,OU=testingOU,DC=SenaSystems,DC=local"
"CN=rbacxadmin,CN=Users,DC=SenaSystems,DC=local"
"CN=auditor,CN=Users,DC=SenaSystems,DC=local"
"CN=ab14156,CN=Users,DC=SenaSystems,DC=local"
"CN=Administrator,CN=Users,DC=SenaSystems,DC=local"
"CN=Guest,CN=Users,DC=SenaSystems,DC=local"
"CN=SUPPORT_388945a0,CN=Users,DC=SenaSystems,DC=local"
"CN=OIMUser,CN=Users,DC=SenaSystems,DC=local"
"CN=David Davids,OU=anotherOU,OU=testingOU,DC=SenaSystems,DC=local"
"CN=rbacxadmin,CN=Users,DC=SenaSystems,DC=local"
"CN=auditor,CN=Users,DC=SenaSystems,DC=local"
"CN=ab14156,CN=Users,DC=SenaSystems,DC=local"
In this example, I wish to leverage off the rbacxadmin account, which will be my admin account. If this is the case, my ldapAuthentication.rootContextwill beCN=Users,DC=SenaSystems,DC=local. We can then use this information within the ldap.properties file proceeding with the following changes.
This is the original segment from within the file: # Properties file with ldap authenticaton related settings
ldapAuthentication.defaultRole=ROLE_AUTHENTICATED_PRINCIPAL
ldapAuthentication.enabled=false
ldapAuthentication.tryNextProviderIfNoAuthenticated=false
ldapAuthentication.stopIfCommunicationError=true
#Multiple urls can be specified using ; as delimeter
#ldapAuthentication.url=ldap\://localhost:389/DC=vaau,DC=corp,DC=net
ldapAuthentication.url=ldap\://localhost:389/
ldapAuthentication.rootContext=DC=vaau,DC=corp,DC=net
Now change this to:
# Properties file with ldap authentication related settings
ldapAuthentication.defaultRole=ROLE_AUTHENTICATED_PRINCIPAL
ldapAuthentication.enabled=true
ldapAuthentication.tryNextProviderIfNoAuthenticated=false
ldapAuthentication.stopIfCommunicationError=true
#Multiple urls can be specified using ; as delimeter
#ldapAuthentication.url=ldap\://localhost:389/DC=vaau,DC=corp,DC=net
ldapAuthentication.url=ldap\://172.16.128.129:389/
ldapAuthentication.rootContext=CN=Users,DC=SenaSystems,DC=local
ldapAuthentication.defaultRole=ROLE_AUTHENTICATED_PRINCIPAL
ldapAuthentication.enabled=false
ldapAuthentication.tryNextProviderIfNoAuthenticated=false
ldapAuthentication.stopIfCommunicationError=true
#Multiple urls can be specified using ; as delimeter
#ldapAuthentication.url=ldap\://localhost:389/DC=vaau,DC=corp,DC=net
ldapAuthentication.url=ldap\://localhost:389/
ldapAuthentication.rootContext=DC=vaau,DC=corp,DC=net
ldapAuthentication.defaultRole=ROLE_AUTHENTICATED_PRINCIPAL
ldapAuthentication.enabled=true
ldapAuthentication.tryNextProviderIfNoAuthenticated=false
ldapAuthentication.stopIfCommunicationError=true
#Multiple urls can be specified using ; as delimeter
#ldapAuthentication.url=ldap\://localhost:389/DC=vaau,DC=corp,DC=net
ldapAuthentication.url=ldap\://172.16.128.129:389/
ldapAuthentication.rootContext=CN=Users,DC=SenaSystems,DC=local
Restart the web server and test if you can connect
About the author
Daniel is a Technical Manager with over 10 years of consulting expertise in the Identity and Access Management space.Daniel has built from scratch this blog as well as technicalconfessions.com
Follow Daniel on twitter @nervouswiggles
Comments
Other Posts
February 6, 2020
Created by: Daniel Redfern
AS I was migrating my environment into an S3 environment, I wanted to leverage off the SES services that AWS provide, more specifically, to leverage the off the SMTP functionality by sending an email via PHP
Read More...
AS I was migrating my environment into an S3 environment, I wanted to leverage off the SES services that AWS provide, more specifically, to leverage the off the SMTP functionality by sending an email via PHP
Read More...
February 24, 2019
Created by: Daniel Redfern
The WeMos D1 is a ESP8266 WiFi based board is an extension to the current out-of-the-box library that comes with the Arduino installation. Because of this, you need to import in the libraries as well as acknowledging the specific board. This process is highly confusion with a number of different individuals talking about a number of different ways to integrate.
Read More...
The WeMos D1 is a ESP8266 WiFi based board is an extension to the current out-of-the-box library that comes with the Arduino installation. Because of this, you need to import in the libraries as well as acknowledging the specific board. This process is highly confusion with a number of different individuals talking about a number of different ways to integrate.
Read More...
August 7, 2018
Created by: Daniel Redfern
NameID element must be present as part of the Subject in the Response message, please enable it in the IDP configuration.
Read More...
NameID element must be present as part of the Subject in the Response message, please enable it in the IDP configuration.
Read More...
June 15, 2018
Created by: Daniel Redfern
For what I see, there's not too many supportive documentations out there that will demonstrate how provision AD group membership with the ICF connector using OpenIDM. The use of the special ldapGroups attribute is not explained anywhere in the Integrators guides to to the date of this blog. This quick blog identifies the tasks required to provision AD group membership from OpenIDM to AD using the LDAP ICF connector. However this doesn't really explain what ldapGroups actually does and there's no real worked example of how to go from an Assignment to ldapGroups to an assigned group in AD. I wrote up a wiki article for my own reference: AD group memberships automatically to users This is just my view, others may disagree, but I think the implementation experience could be improved with some more documentation and a more detailed example here.
Read More...
For what I see, there's not too many supportive documentations out there that will demonstrate how provision AD group membership with the ICF connector using OpenIDM. The use of the special ldapGroups attribute is not explained anywhere in the Integrators guides to to the date of this blog. This quick blog identifies the tasks required to provision AD group membership from OpenIDM to AD using the LDAP ICF connector. However this doesn't really explain what ldapGroups actually does and there's no real worked example of how to go from an Assignment to ldapGroups to an assigned group in AD. I wrote up a wiki article for my own reference: AD group memberships automatically to users This is just my view, others may disagree, but I think the implementation experience could be improved with some more documentation and a more detailed example here.
Read More...
November 8, 2017
Created by: Daniel Redfern
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid Because they all share the ICF connector framework, the error/solution would be the same.
Read More...
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid Because they all share the ICF connector framework, the error/solution would be the same.
Read More...
November 8, 2017
Created by: Daniel Redfern
org.forgerock.script.exception.ScriptCompilationException: missing ; before statement
Read More...
org.forgerock.script.exception.ScriptCompilationException: missing ; before statement
Read More...
September 17, 2017
Created by: Daniel Redfern
ForgeRock IDM - org.forgerock.script.exception.ScriptCompilationException: missing ; before statement
Read More...
ForgeRock IDM - org.forgerock.script.exception.ScriptCompilationException: missing ; before statement
Read More...
September 17, 2017
Created by: Daniel Redfern
When performing the attempt of a reconciliation from ForgeRock IDM to Active Directory, I would get the following error
Read More...
When performing the attempt of a reconciliation from ForgeRock IDM to Active Directory, I would get the following error
Read More...
September 17, 2017
Created by: Daniel Redfern
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid Because they all share the ICF connector framework, the error/solution would be the same.
Read More...
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid Because they all share the ICF connector framework, the error/solution would be the same.
Read More...
September 12, 2017
Created by: Daniel Redfern
During the reconcilation from OpenIDM to the ICF google apps connector, the following error response would occur. ERROR Caused by com.google.api.client.auth.oauth2.TokenResponseException 400 Bad Request - invalid_grant
Read More...
During the reconcilation from OpenIDM to the ICF google apps connector, the following error response would occur. ERROR Caused by com.google.api.client.auth.oauth2.TokenResponseException 400 Bad Request - invalid_grant
Read More...