LDAP Connections

Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. This page describes how TAG administrators can create connections to an LDAP like OpenLDAP, Microsoft Active Directory, Netscape Directory Server or Novell eDirectory. TAG uses LDAP as sources of Accounts and Claims, see more about it in Account Sources and Claim Sources.

General Settings

To create a connection with LDAP some general configurations are needed.

Configuration

Description

Description

The description of your LDAP server.

Host

The host of your LDAP server.

Port

The default port for many LDAP servers is 389. When TLS/SSL is used, the port is often changed to 636.

Use SSL

Allows Secure Sockets Layer (SSL) to be turned on and off.

Use TLS

Allows Transport Layer Security (TLS) to be turned on and off.

It is recommended to first try port 389 with TLS and SSL disabled. If Connection Refused appears, try port 636 with TLS enabled. If neither work, contact the LDAP system administrator to request the correct host, port and TLS/SSL settings.

Pooling

Connection pooling can offer a significant performance boost; the cost of initializing an ldap connection instance is high, so TAG keeps a pool of connections that will be available to be used. In this section you can configure the min and max of connections that the gateway can have in the pool.

Configuration

Description

Default

Min Size

Minimum size for the pool of connections.

3

Max Size

Maximum size for the pool of connections.

10

Authentication

This is the authentication configuration to access your LDAP server.

Configuration

Description

Bind DN (Distinguished Name)

The full domain name for the user authenticating to the LDAP Directory. e.g. uid=admin,ou=system

Bind Credentials

The password for the user authenticating to the LDAP Directory.

Some development LDAP enviromnets do not require authentication, so for development purposes, not providing it is fine.

Validation

The validation checks if the connection is healthy to be part of the pool. This validation may happen in different phases and you should be able to choose which phases would you like to check the connections.

Configuration Description

On Borrow

If true connections will be validated before being returned from the pool. If the validation fails, the connection is destroyed, and a new connection will be retrieved from the pool (and validated).

Return

If true connections will be validated before being returned to the pool. If the validation fails, the connection is destroyed instead of being returned to the pool.

While Idle

If true connections will be validated by the idle connection evictor (if any). If the validation fails, the connection is destroyed and removed from the pool.

Base DN (Distinguished Name)

The Base DN is the starting point in the hierarchy at which the search will begin. On each validation a search will be performed. e.g. ou=people,o=supertribe

Filter

The filter enables you to define search criteria for finding an entry. The filter will be used in the validation search performed on each validation. e.g. (objectClass=person)

Testing you LDAP Connection

To be able to test your LDAP Connection go to the LDAP Account Souces or LDAP Claim Sources configuration page. There you will be able to test and troubleshoot possible issues.