Configuring LDAP servers
When configured, MobileIron can interact with LDAP servers. You can configure multiple LDAP servers, but each server must contain unique configuration.
NOTE: | The MobileIron Connector does not support certificate-based authentication. This means that once you enable Connector service, the "Upload X509 Certificate" option in LDAP preferences is not available. |
Procedure
- From the Admin Portal, go to Services > LDAP.
- Click Add New to open the New LDAP Setting page.
-
Edit the fields as necessary.
Refer to the LDAP Server window table for details.
- Scroll to the LDAP Groups setting to specify the set of LDAP groups that Core gets from the LDAP server. Only these groups are available throughout the Admin Portal for viewing or selection.
- Go to Search By LDAP Groups, enter the first characters of an LDAP Group that you want to select.
-
Click the search icon.
The LDAP Groups in the LDAP server that match the search request appear in the Available section.
- Click the right arrow to move one or more LDAP groups to the Selected section.
- Repeat steps 6 through 8 for other LDAP Groups.
-
Click Advance Options to configure LDAP v3 properties.
NOTE: Configurations in the Advanced Options pane apply only to LDAP v3 servers. -
Select the authentication method between the client and server used in the SASL exchange.
- Bind (default): This method uses the directory DN for authentication.
- Kerberos v5 (SASL): This method uses mutual authentication.
-
Select the user ID format from the Authentication User ID Format drop-down list.
- User Principal
- User UPN
- User DN
- User DN with RFC2829 prefix
- User Principal with RFC2829 prefix
-
Select the group member format from the Group Member Format drop-down list.
- DN
- UID
-
Select the parameter for negotiating the authentication from the Quality of Protection drop-down list.
NOTE: LDAP v3 supports the Quality of Protection feature, which is not a LDAP v2 supported feature. - Authentication only is used for authenticating a user to a server.
- Authentication with integrity protection is used to ensure that subsequent LDAP requests and responses are protected against tampering.
- Authentication with integrity and privacy protection is used to ensure that subsequent LDAP requests and responses are encrypted and therefore protected against unintended monitoring. Privacy protection automatically entails integrity protection.
-
Select the LDAP authentication method.
- Use Client TLS Certificate: Select this to use the X509 certificate for authentication.
- Go to Services > LDAP > Preferences to upload the client X509 certificate that MobileIron Core presents to the LDAP server
- Request Mutual Authentication: Select this to verify both the identity of the user that is requesting authentication as well as server providing the requested authentication.
- Select Enable Detailed Debug to enable JNDI debugging for LDAP communication.
- Enter additional (and optional) properties in the Additional JNDI Context Properties field.
-
Most environment properties are predefined but some, such as language, security.credentials, security.principle, are implementation-specific. Properties defined here replace any values that are previously defined, and will take effect the next time the property is invoked. If a context does not have a particular environment property, it behaves as if it has that environment property with its default value. For example,
- To set the language for Japanese, enter Context.LANGUAGE, “ja-JP”
- To set the credentials to the string "secret", enter Context.SECURITY_CREDENTIALS, "secret"
- To set the principal name to the distinguished name "cn=admin, o=MI, c=us," enter Context.SECURITY_PRINCIPAL, "cn=admin, o=MI, c=us"
- Click View LDAP Browser to view the LDAP server directory tree structure.
- Click Test to open the LDAP Test window
- Enter user or group identifier in the appropriate field.
- Click Submit. A result page displays if the user was configured on the LDAP server.
- Return to the LDAP page and click Save. A dialog appears informing of traffic disruption and asks to proceed.
- Click Yes. A dialog appears informing the status.
- Click OK. The server you created appears on the LDAP page.
LDAP Server window
The following table summarizes fields and descriptions in the LDAP Server window:
Fields |
Description |
|||
Directory URL |
Enter the URL to the LDAP server. Make sure to start with “ldap://” or “ldaps://". When using “ldaps://" (LDAP over SSL) :
You do not need to specify the ports when you use these default ports: 389 (LDAP) or 636 (LDAPS). |
|||
Directory Failover URL |
Enter a secondary URL, if available. |
|||
Directory UserID |
Enter the primary user ID, for example, [email protected]. Make sure to include the domain, e.g., @local.domain, with the user ID. |
|||
Directory Password |
Enter the password for the user ID set above. |
|||
Search Results Timeout |
Do not change default of 30 seconds unless you get connection errors. |
|||
Chase Referrals |
Select Enable if you are using a multi-forested domain. This indicates you want to use alternate domain controllers when the targeted domain controller does not have a copy of the requested object. Select Disable if you do not use alternate domain controllers.
|
|||
Admin State |
Select Enable to put the server to service. Make sure to enable the Admin state or the LDAP server will be invisible. |
|||
Directory Type |
Select Domino for the IBM Lotus Domino server platform. The default DN and other LDAP search filters are automatically changed to the Domino server. Select Active Directory for the Microsoft Windows server platform. |
|||
Domain |
Enter the domain name for the Active Directory. This information will automatically traverse all levels of the tree and use to populate Base DN, parent entry. |
Changing the LDAP Server Sync Interval
The default interval for synchronization between MobileIron Core and the LDAP server is 24 hours. You can change this interval for all configured LDAP servers. You might want to change the interval to ensure updated information when the LDAP server data is changing frequently.
NOTE: | For LDAP groups, each synchronization syncs only the LDAP groups that you specified in the LDAP Setting page for each LDAP server at Services > LDAP. |
To change the LDAP sync interval:
Procedure
- From the Admin Portal, go to Services > LDAP > Preferences.
-
Select the preferred interval from the drop-down.
Intervals range from 15 minutes to 24 hours.
- Click Save.