Authenticate through Active Directory

Version 1 by Robin Shen
on Dec 04, 2014 05:20.


 
compared with
Current by Robin Shen
on Dec 04, 2014 06:06.


 
Key
These lines were removed. This word was removed.
These lines were added. This word was added.

View page history


There are 3 changes. View first change.

 h1. Scenario
 Authenticate users through Active Directory and retrieve associated groups to determine user permission. We assume that:
 # Domain of the Active Directory is example.com.
 # This Active Directory can be accessed through address _ldap://ad.example.com:389_
 # Users and groups are managed under LDAP entry _cn=Users,dc=example,dc=com_.
 # User _Administrator_ is used to search user and group information in this Active Directory.
  # User _quickbuild_ is used to search user and group information in this Active Directory.
  
 h1. Resolution
 # For each Active Directory group you want to assign QuickBuild permissions, create a group with the same name in QuickBuild, and set proper permissions.
# Login as Administrator, switch to menu _Authentication->Authenticators_, and add an authenticator of LDAP type like below:
  # Login as Administrator, switch to menu _Authentication->Security Settings_, and add an authenticator of _Active Directory_ type like below:
 !ad.png!
 # Your users should now be able to login to QuickBuild and access to QuickBuild functionalities will be controlled using the group information from Active Directory.
  
 {info}To browse Active Directory user and group information in a LDAP friendly way (that is, be able to browse DN and various attribute names/values), you may need to install a LDAP client (such as [JXplorer|http://www.jxplorer.org]), and connect it to your Active Directory using LDAP url, user and password information listed above.{info}