-
Configuring LDAP Authentication
-
To configure LDAP authentication by using the configuration utility
-
-
Configure NetScaler Gateway to use RADIUS and LDAP Authentication with Mobile Devices
-
Restrict access to NetScaler Gateway for members of one Active Directory group
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
To configure LDAP authentication by using the configuration utility
-
Navigate to NetScaler Gateway >Policies > Authentication.
-
Click LDAP.
-
In the details pane, on the Policies tab, click Add.
-
In Name, type a name for the policy.
-
Next to Server, click New.
-
In Name, type the name of the server.
-
Under Server, in IP Address and Port, type the IP address and port number of the LDAP server.
-
In Type, select either AD for Active Directory or NDS for Novell Directory Services.
-
Under Connection Settings, complete the following:
-
In Base DN (location of users), type the base DN under which users are located. Base DN search the users located under the selected directory (AD or NDS).
The base DN is derived from the Bind DN by removing the user name and specifying the group where users are located. Examples of the syntax for base DN are:
ou=users,dc=ace,dc=com cn=Users,dc=ace,dc=com <!--NeedCopy-->
-
In Administrator Bind DN, type the administrator bind DN for queries to the LDAP directory. Examples for the syntax of bind DN are:
domain/user name ou=administrator,dc=ace,dc=com user@domain.name (for Active Directory) cn=Administrator,cn=Users,dc=ace,dc=com <!--NeedCopy-->
For Active Directory, the group name specified as cn=groupname is required. The group name that you define in NetScaler Gateway and the group name on the LDAP server must be identical.
For other LDAP directories, the group name either is not required or, if necessary, is specified as ou=groupname.
NetScaler Gateway binds to the LDAP server using the administrator credentials and then searches for the user. After locating the user, NetScaler Gateway unbinds the administrator credentials and rebinds with the user credentials.
-
In Administrator Password and Confirm Administrator Password, type the administrator password for the LDAP server.
-
-
To retrieve more LDAP settings automatically, click Retrieve Attributes.
When you click Retrieve Attributes, the fields under Other Settings populate automatically. If you want to ignore this step, continue with Steps 12 and 13. Otherwise, skip to Step 14.
-
Under Other Settings, in Server Logon Name Attribute, type the attribute under which NetScaler Gateway must look for user logon names for the LDAP server that you are configuring. The default is
samAccountName
. -
In Search Filter, type the value to search for the users associated with single or multiple active directory groups.
For example, “memberOf=CN=GatewayAccess,OU=Groups,DC=Users,DC=lab”.
Note
You can use the preceding example to restrict NetScaler Gateway access only to the members of a specific AD group.
-
In Group Attribute, leave the default memberOf for Active Directory or change the attribute to the attribute of the LDAP server type you are using. This attribute enables NetScaler Gateway to obtain the groups associated with a user during authorization.
-
In Security Type, select the security type and then click Create.
-
To allow users to change their LDAP password, select Allow Password Change.
Note:
- If you select PLAINTEXT as the security type, allowing users to change their passwords is not supported.
- If you select PLAINTEXT or TLS for security, use port number 389. If you select SSL, use port number 636.
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.