Add LDAP authentication server 编辑
When you integrate LDAP protocol with RADIUS and TACAS authentication servers, you can use ADM to search and authenticate user credentials from distributed directories.
Navigate to Settings > Authentication.
Select the LDAP tab and then click Add.
On the Create LDAP Server page, specify the following parameters:
Name – Specify the LDAP server name
Server Name/IP address – Specify the LDAP IP address or server name
Security Type – Type of communication required between the system and the LDAP server. Select from the list. If plain text communication is inadequate, you can choose encrypted communication by selecting either Transport Layer Security (TLS) or SSL
Port – By default, port 389 is used for PLAINTEXT. You can also specify port 636 for SSL/TLS
Server Type – Select Active Directory (AD) or Novell Directory Service (NDS) as the type of LDAP server
Time-out (seconds) – Time in seconds for which the Citrix ADM system waits for a response from the LDAP server
LDAP Host Name – Select Validate LDAP Certificate check box and specifying the host name to be entered on the certificate
Clear the Authentication option and specify the SSH Public Key. With key-based authentication, you can now fetch the list of public keys that are stored on the user object in LDAP server through SSH.
Under Connection Settings, specify the following parameters:
Base DN – The base node for LDAP server to start the search
Administrator Bind DN – User name to it bind to LDAP server. For example, admin@aaa.local.
Bind DN password – Select this option to provide a password for authentication
Enable Change Password – Select this option to enable password change
Under Other Settings, specify the following parameters
Server Log on Name Attribute – Name attribute used by the system to query the external LDAP server or an Active Directory. Select samAccountname from the list.
Search Filter – Configure external users for two-factor authentication according to the search filter configured in LDAP server. For example, vpnallowed=true with ldaploginame
samaccount
and the user-supplied user name bob would yield an LDAP search string of:&(vpnallowed=true)(samaccount=bob)
.Note
By default, the values in the search filter are enclosed in brackets.
Group Attribute – Select memberOf from the list.
Sub Attribute Name – The Sub attribute name for group extraction from the LDAP server.
Default Authentication Group – Default group to choose when the authentication succeeds in addition to extracted groups.
Click Create.
The LDAP server is now configured.
Note
If the users are Active Directory group members, the group and the users’ names on Citrix ADM must have the same names of Active Directory group members.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论