Lightweight Directory Access Protocol (LDAP)
About LDAP
Lightweight Directory Access Protocol (LDAP) is used for querying and managing directories that run over TCP/IP. Microsoft Active Directory represents one implementation of LDAP. APM supports integration with Microsoft Active Directory to facilitate automatic login and synchronization of user information.
LDAP is not limited to contact information, or even information about people. LDAP is used to look up encryption certificates, pointers to printers and other services on a network, and to enable same sign-on, where one password for a user is shared between many services. LDAP is appropriate for any type of directory-like information, where fast look-ups and less-frequent updates are standard.
As a protocol, LDAP does not define how programs work on either the client or server side. It defines the "language" used for client programs to talk to servers (as well as servers to servers). On the client side, a client may be an email program, a printer browser, or an address book. The server may speak only LDAP, or have other methods of sending and receiving data; LDAP may just be an add-on method.
LDAP continues to be a popular standard for communicating record-based, directory-like data between programs.
About Domain Records
Domain records store identifying information about the Microsoft Active Directory domains that exist in your organization.
- At least one Domain record must exist to identify the Active Directory domain that contains user accounts that you want to synchronize with APM. You can create as many Domain records as needed to identify all the domains from which you want to retrieve user information.
The baseline APM product contains a Domain record that you can use as the basis for creating the one required Domain record.
- If you have only one Microsoft Active Directory domain, you can simply modify the baseline Domain record.
- If you have multiple Active Directory domains, you can modify the baseline Domain record and create new records to identify your additional domains. When you create a new Domain record, the default values will match those of the baseline Domain record to provide a guideline for specifying values in the new record.
About LDAP Field Mapping Records
LDAP Mapping records define how fields in Microsoft Active Directory user accounts correspond to fields in APM user records. The mappings that are defined in LDAP Mapping records are used to synchronize data between Microsoft Active Directory and APM. The LDAP Mapping records determine what information should be retrieved from Microsoft Active Directory and where it should be stored in APM.
- LDAP Field: Defines the source fields in Microsoft Active Directory.
- Meridium Field: Defines the target fields for the corresponding Active Directory fields in APM.
About the LDAP Synchronization Process
When a scheduled or manual synchronization is run, LDAP will gather updated information from Microsoft Active Directory, import it into APM, and update the corresponding Security User records. When the synchronization process is run, APM Security User properties and status will be updated to reflect the last saved information in Microsoft Active Directory.
The synchronization process will import to APM only the changes (i.e., new users and updated information) that have been made in Microsoft Active Directory since the last synchronization ran, based on the Last Execution date in the job schedule item. Because only changes are imported to APM, the more often you run the synchronization process, the faster it will be (i.e., the fewer the changes, the faster the process). If you need to perform a full update in APM, you will need to delete and recreate the scheduled item to clear the Last Execution date. Performing a full synchronization will take longer than performing an update synchronization.
What Happens During Synchronization?
- The APM system will retrieve the information for the Microsoft Active Directory users associated with the Microsoft Active Directory domains that have been defined in APM. The corresponding Security User records will be updated. Fields in APM will be updated with the information in Microsoft Active Directory using LDAP Field Mapping records.
- If the APM system finds a user in Microsoft Active Directory who does not have a corresponding Security User record in APM:
- A Security User record will be created in the APM database.
- The Security User record will be linked to the Domain record that identifies the Microsoft Active Directory domain in which the user exists.
- The Security User will be associated with each APM Security Role whose name matches exactly the name of a Microsoft Active Directory Group to which that user belongs.
- The Security User will be removed from each APM Security Role whose name does not match exactly the name of a Microsoft Active Directory Group to which that user belongs.
- If the Microsoft Active Directory user is locked out of Microsoft Active Directory, the user will not be locked in APM database.
- All the settings specified in the User Defaults page, including Time Zone, UOM, Culture, Language, and Site are assigned to new users.Note: The default site in the User Defaults page is assigned to new users only if the default site is not configured in the Microsoft Active Directory or in the domain record in LDAP Manager.
About Synchronization and Authentication
APM Security Users are authenticated at log-in. In addition to validating status for a user (whether the Active check box is selected in the Security User record for that user), at log-in, the APM system initializes all the information and permissions for that user. If any of that information changes while the Security User is logged in to the APM system, those changes will not be reflected immediately. The changes will not take effect until the user logs out of APM and then logs back in. This behavior applies to changes made manually and automatically through the LDAP synchronization process. In other words, regardless of when or how often the LDAP synchronization process runs, changes made to a user account will not be applied until the next time a user logs in to the APM system.
About LDAP Authentication and Same Sign-On
LDAP authentication is generally used by Same Sign-On (SSO) systems. The enterprise user logs on initially using a form-based enterprise login screen. The user enters an ID and password, and the SSO software then takes the information and sends it to the security server using an encrypted connection. The security server then logs on to the LDAP server on behalf of the user by providing the LDAP server with the user's ID and password. If successful, the security server then proceeds with any authorization and/or lets the user proceed to the application or resource that he or she wants to access.
About LDAP Log Records
About This Task
To access LDAP Log records, on the APM Server, navigate to C:\ProgramData\Meridium, and then select the Log file whose file name contains the date that corresponds to the time at which the LDAP synchronization process was run (e.g., Meridium_2015-12-20.txt).
-
{0} – SyncUsers
When the LDAP synchronization process finishes, the following line of text is added to the Log. Based on the information that was synced, the values within brackets will vary.
-
{0} - Finished SyncUsers. Found {1} actions
When the LDAP synchronization process is running, if the Enable informational messages check box is selected, additional LDAP-related records will be added to the Log. In the Log, these additional records will appear between the records described previously, which define the beginning and end of the LDAP synchronization process. The following are examples of additional LDAP-related records that could be created in the Log. This list is not comprehensive.
-
Found {0} domains to process
-
Found {0} users in the {1} domain
-
Found {0} APM users associated with the domain {1}
-
Found {0} actions for the domain {1}
After opening a Log file containing LDAP information, you can use the Find… feature in Notepad to search the Log for instances LDAP-related records (i.e., you could search for syncusers or domains to process to find lines of text containing those terms).
Access the LDAP Page
Procedure
What To Do Next
LDAP Workflow
This topic provides a basic workflow for using this module, as well as links to the available procedures, concepts, and reference topics.
Steps
- Enable LDAP integration and logging.Note: LDAP integration will not be available until it has been enabled.
- If you did not select the Enable APM Security check box, determine which existing Microsoft Active Directory Groups you want to map to APM Security Roles, and for each of those Microsoft Active Directory Groups, create a APM Security Role whose name matches exactly a Microsoft Active Directory Group name. When LDAP synchronizes Microsoft Active Directory and APM, each user will be assigned to the APM Security Roles whose names match exactly the names of the Microsoft Active Directory Groups to which they belong. If you selected the Enable APM Security check box, this step is not required, and you will manage Security Role assignment in APM .
- Create a Domain record in APM for each Active Directory domain that contains users whose information should be synchronized with records in APM. Domain records store identifying information about the Microsoft Active Directory domains that exist in your organization.
-
Schedule an LDAP synchronization process to periodically update APM with user information from Microsoft Active Directory.Important: After implementing LDAP synchronization, do not modify Security User information in APM; instead, modify the user information in Microsoft Active Directory, and then synchronize. Synchronization overwrites all APM Security User site assignments, Security Role assignments, and all other mapped information with the most recent information in Microsoft Active Directory.
Enable LDAP Integration and Logging
About Managing Users When LDAP Integration is Enabled
About This Task
User information may change periodically in Microsoft Active Directory (e.g., group assignment, site assignment, address, phone number, job title, etc.).
One advantage of configuring LDAP integration is the ability to synchronize APM Security User records with the information in Microsoft Active Directory. The changes made in Microsoft Active Directory will be reflected in APM after synchronization.
- If you did not select the Enable APM Security check box, Security Role assignment will not be modified during synchronization, and you will manage Security Role assignment in APM .
- LDAP integration is designed to ensure that these the systems (APM and Microsoft Active Directory) are synchronized. Always be sure to follow the recommended workflow for managing users.
User Status after LDAP Synchronization
About This Task
- The Microsoft Active Directory account for the user is disabled.
- The user is not assigned to any Microsoft Active Directory Groups.
The Active check box for a APM Security User will be selected automatically after these conditions are resolved in Microsoft Active Directory and the synchronization process runs again.
Create a Domain Record
LDAP Domain Records
This topic provides an alphabetical list and description of the fields that exist in Domain records. The information in the table reflects the baseline state and behavior of these fields.
Field | Data Type | Description | Behavior and Usage |
---|---|---|---|
Caption | Character | A short description of the domain. | You can define this value manually to help distinguish this domain from any other domains that you define. |
Default Site | Character | The default site that will be assigned to new Security Users created during LDAP synchronization. | None |
Root | Character | The starting point of the container in which APM will look for user objects in Microsoft Active Directory. | The APM system will use this information to find user objects in Microsoft Active Directory. |
User Filter | Character | This filter is used to locate users within the specified directory. | This filter is used during the synchronization process to locate Microsoft Active Directory users that belong to a specific group within the domain. You can accept the default value in this field. |
LDAP Field Mapping Records
This topic provides an alphabetical list and description of the fields that exist in LDAP Field Mapping records. The information in the table reflects the baseline state and behavior of these fields. For more information on the baseline LDAP Field Mapping records, refer to the LDAP Baseline Field Mapping Records topic.
Field | Data Type | Description | Behavior and Usage |
---|---|---|---|
LDAP Field | Character | The name of Microsoft Active Directory field that will serve as the source field for mapping. | The baseline Field Mapping records that appear in the Domain records by default contain a set of Active Directory fields that are mapped to the corresponding APM fields. However, if you want to create additional Field Mapping records, you can manually define the Active Directory field that you want to map to a reserved APM field. You can obtain a list of available Active Directory fields from Microsoft. |
Meridium Field | Character | The field ID of the field in APM that will serve as the target field for mapping. | The baseline Field Mapping records that appear in the Domain records by default contain a set of Active Directory fields that are mapped to the corresponding APM fields. However, if you want to create additional Field Mapping records, you can use the reserved APM fields to map to the Active Directory fields. You must specify the field ID, not the field caption. |
LDAP Baseline Field Mapping Records
This topic provides an alphabetical list and description of the fields that exist in LDAP Baseline Field Mapping records. The information in the table reflects the baseline state and behavior of these fields.
LDAP Field | APM Field | Notes |
---|---|---|
company | MI_HR_COMPANY_CHR | None |
department | MI_HR_DEPT_CHR | None |
givenName | MI_HR_FIRST_NAME_CHR | None |
l | MI_HR_CITY_CHR | None |
MI_HR_EMAIL_TX | None | |
postalAddress | MI_HR_ADDR1_CHR | None |
postalCode | MI_HR_POSTCODE_CHR | None |
sn | MI_HR_LAST_NAME_CHR | None |
st | MI_HR_STATE_CHR | None |
telephoneNumber | MI_HR_PHONE1_CHR | None |
title | MI_HR_JOB_TITLE_CHR | None |
Reserved APM Fields for LDAP Mapping
The following table lists the reserved APM fields that are available for mapping with LDAP fields.
Reserved APM Field | Description | Notes |
---|---|---|
MI_HR_ADDR2_CHR | Address2 | None |
MI_HR_AREA_RESPONSIBILITY_TX | AreaOfResponsibility | None |
MI_HR_BADGE_ID | BadgeId | None |
MI_HR_BUSINESS_UNIT_TX | BusinessUnit | None |
MI_HR_COMMENTS_TX | Comments | None |
MI_HR_COUNTRY_CHR | Country | None |
MI_HR_FAX_CHR | FaxNumber | None |
MI_HR_MID_INIT_CHR | Initial | None |
SEUS_LANGUAGE_ID | LanguageId | None |
MI_HR_PHONE2_CHR | PhoneNumber2 | None |
Remove a Domain Record
Procedure
Run the LDAP Synchronization Process Manually
About This Task
Procedure
Schedule an LDAP Synchronization Process
Procedure
Results
- When the job schedule item is active, the synchronization will be executed based on the defined schedule.