With this login type, LDAP servers will be used for authentication. The list of URLs represents a connection to the same replicated LDAP environment on different servers in the default configuration. The list will be checked top-down if a server is inaccessible, e.g., due to updates.
LDAP servers will be searched in the DNS of the current domain using the keys _ldap._tcp.<domain> and _ldaps._tcp.<domain> if the list is left empty.
Sample login URLs look like ldap://MyLdapServer:389/ or ldaps://MyLdapServer:636/ (with SSL).
The authentication provider supports both the Active Directory LDAP and OpenLDAP v3 backends. An AD backend automatically authenticates users, while OpenLDAP requires the following filters:
# OpenLDAP user search filter (&(objectClass=person)(uid=<username>))
User groups are determined using the memberOf and primaryGroupId attributes of a user, meaning that groups will only be determined after the user successfully authenticates. The search query for user, used to load the available roles, includes a filter for AD as well:
# AD / OpenLDAP user search filter for determining groups (|(&(objectCategory=person)(sAMAccountName=<username>))(&(objectClass=person)(uid=<username>)))
This option allows you to adjust the behaviour of checking LDAP URLs. As mentioned previously, all URLs are checked sequentially by default. This is the default option when only a single domain is to be served and additional URLs are used by fallback servers.
If checked, there will be no SSL verification when connecting to LDAP-URLs. This option can be used, when the certificate used on an LDAP-URL can not be trusted from the application side and uses, e.g., a private CA.
The Default Domain is used in Windows environments to prefix the username during authentication in the form <WINDOWS DOMAIN NAME>\<username>. It allows users to log in to a Windows domain without prefixing the username with that domain.
Note: The domain should usually be specified as a Windows 2000 variant. The specific value can be found in the Active Directory in a user's settings.
The Bind User and Password are advanced options and may be required to search for user entries in the AD/OpenLDAP that does not allow anonymous binding. The Bind User has to be given in DN notation, e.g., cn=service,dc=mydomain,dc=local.
The Base DN is an advanced option and allows setting a distinguished name that should be used as a search base for users and groups.
The User RDN is an advanced option and allows setting a distinguished name relative to the Base DN that should be used as a search base for users.
The Groups RDN is an advanced option and setting to set a distinguished name relative to the Base DN that should be used as a search base for groups.