Lightweight Directory Access Protocol: Difference between revisions

From Scalelogic Wiki
Jump to navigation Jump to search
migrate>Ra-N
No edit summary
No edit summary
Line 1: Line 1:
Here you can configure LDAP domain name and the password.
This functionality is available in: '''User Management''' > '''Share users/group'''s > '''Authorization protocols''' > '''Lightweight Directory Access Protocol (LDAP)'''


*'''LDAP domain name''': The name must start with 'dc=' and then contain only alphanumerical characters (a-zA-Z0-9)
*'''Password''': The minimum length for of the password is 6 characters




To create and manage a database on a local server, the following information is required:


'''Note:''' when mounting given share with LDAP credentials, please use following syntax ["Username" must consist of workgroup and actual user name]:
*'''LDAP domain name''': The name must start with 'dc=' and contain only alphanumeric characters (a-zA-Z 0-9-_.). It cannot begin or end with a space or have several spaces in a row.
*'''Password''': The minimum length of the password is 6 characters.
 
<br/>'''NOTE''': When mounting the given share with LDAP credentials, please use the following syntax:


*Accessing share: \\server_ip\share_name
*Accessing share: \\server_ip\share_name
*Username: workgroup\username
*Username: workgroup\username (“Username" must consist of workgroup and actual user name)
*Password: secretpass
*Password: secret pass
 
The workgroup and username are defined by the system administrator.
 
'''See Also:&nbsp; '''[http://wiki.scalelogicinc.com/zx/SMB_service SMB service]
 
 
 
A unique ID (UID) is assigned to each new user in the database. Similarly, a unique ID (GID) is assigned to each new user group. Once assigned, the UID or GID cannot be reused, even if the user or user group no longer exists in the database until said database is reset.<br/>You can create 899,999 unique users (UIDs) and 99,486 unique user groups (GIDs).
 
 
 
'''To connect to the local LDAP database using an external server, the LDAP client must''':
 
*use the '''TLS''' protocol with an encrypted connection on '''port 389'''
*accept '''self-signed certificates'''
 


<br/>For each new user in a database, a unique ID (UID) is assigned. Similarly, a GID is assigned to a new user group. Once assigned, the UID or GID cannot be reused, even if the user or user group no longer exists in the database, until the database is reset.


You are able to create 899 999 unique users (UIDs) and 99 486 unique user groups (GIDs).
Below you’ll find an example showing what connecting to the local LDAP database looks like. The "LDAP domain name" is set as "dc=internal,dc=lan":<br/>'''Host''': IP or domain name of the server, e.g. 192.168.174.100<br/>'''Port''': 389 (with enabled TLS encryption)<br/>'''Base DN''': dc=internal,dc=lan<br/>'''Un-K DN''': cn=admin,dc=internal,dc=lan<br/>'''Users base DN''': ou=people,dc=internal,dc=lan<br/>'''Groups base DN''': ou=groups,dc=internal,dc=lan


[[Category:Help topics]]
[[Category:Help topics]]

Revision as of 08:31, 30 May 2022

This functionality is available in: User Management > Share users/groups > Authorization protocols > Lightweight Directory Access Protocol (LDAP)


To create and manage a database on a local server, the following information is required:

  • LDAP domain name: The name must start with 'dc=' and contain only alphanumeric characters (a-zA-Z 0-9-_.). It cannot begin or end with a space or have several spaces in a row.
  • Password: The minimum length of the password is 6 characters.


NOTE: When mounting the given share with LDAP credentials, please use the following syntax:

  • Accessing share: \\server_ip\share_name
  • Username: workgroup\username (“Username" must consist of workgroup and actual user name)
  • Password: secret pass

The workgroup and username are defined by the system administrator.

See Also:  SMB service


A unique ID (UID) is assigned to each new user in the database. Similarly, a unique ID (GID) is assigned to each new user group. Once assigned, the UID or GID cannot be reused, even if the user or user group no longer exists in the database until said database is reset.
You can create 899,999 unique users (UIDs) and 99,486 unique user groups (GIDs).


To connect to the local LDAP database using an external server, the LDAP client must:

  • use the TLS protocol with an encrypted connection on port 389
  • accept self-signed certificates


Below you’ll find an example showing what connecting to the local LDAP database looks like. The "LDAP domain name" is set as "dc=internal,dc=lan":
Host: IP or domain name of the server, e.g. 192.168.174.100
Port: 389 (with enabled TLS encryption)
Base DN: dc=internal,dc=lan
Un-K DN: cn=admin,dc=internal,dc=lan
Users base DN: ou=people,dc=internal,dc=lan
Groups base DN: ou=groups,dc=internal,dc=lan