Configuring Default LDAP Settings

  1. Log into the KeyControl webGUI on any node in the cluster using an account with Security Admin privileges.

  2. On the top menu bar, click Settings.
  3. In the Default Settings section, click Authentication.
  4. In the Type drop-down, select LDAP.
  5. Enter the LDAP server information as follows:

    Field

    Description

    Server URL

    The LDAP server IP address or hostname. The URL should start with ldap:// or ldaps:// and can include a port number after the name. For example, ldaps://10.238.66.33:389.

    Note: KeyControl does not currently support multiple LDAP servers.

    TLS

    Enable this option if you want KeyControl to use Transport Layer Security (TLS) protocol when communicating with the LDAP server.

    Do not use this option if the Server URL begins with ldaps://.

    Base DN

    The Distinguished Name (DN) of the node where the search for the user should start. For performance reasons, the base DN should be as specific as possible.

    For example, dc=ldapserver,dc=com.

    Bind User

    The DN of the user KeyControl should use when logging into the LDAP server. This DN is usually an administrative user and it can have read only permissions on the server.

    For example: CN=Administrator,CN=Users,dc=ldapserver,dc=com

    Bind Password

    The password for the Bind User account.

    UID Attribute

    The Security Manager Account Name (sAMAccountName) for the user.

    Note: The sAMAccountName is not used when the LDAP connection is tested. If the test passes but authentication fails, make sure this attribute is correct.
  6. When you are finished, click Apply.