Using an LDAP Server

This topic describes integration with the LDAP server.

LDAP Server Overview

This section describes support for using PPS with the LDAP server.

Understanding LDAP Server

Lightweight Directory Access Protocol (LDAP) facilitates the access of online directory services. The Internet Engineering Task Force (IETF) designed and specified LDAP as a better way to make use of X.500 directories, having found the original Directory Access Protocol (DAP) too complex for average Internet clients to use. LDAP is a relatively simple protocol for updating and searching directories running over TCP/IP.

LDAP directory consists of a collection of attributes with a name, known as a distinguished name (DN). Each of the entry’s attributes, known as a relative distinguished name (RDN), has a type and one or more values. The types are typically mnemonic strings, such as CN for common name. The valid values for each field depend on the types.

The full DN is constructed by stringing together RDNs from most specific to least specific, separated by commas, as shown in the following example:

cn=Bob_Employee, ou= account_mgr, o=sales, dc=Acme,dc=com.

LDAP Feature Support

Pulse Secure access management framework supports the following LDAP features:

LDAP directory services to retrieve user attributes and group membership in role mapping rules

Encrypted connections to the LDAP server using LDAP over SSL (LDAPS) or Start Transport Layer Security (TLS)

Password management feature enabling users who access an LDAP server to manage their passwords using the policies defined on the LDAP server

Fine-grained password policy (FGP) for Active Directory 2008

Interoperability Requirements and Limitations

The following limitations apply to interoperability with LDAP:

By default, challenge response protocols are disabled for LDAP servers. Use these protocols only with noninteractive devices (for example, phones), as password management is not possible if these protocols are used for authentication.

To use the CHAP, EAP-MD5-Challenge, MS-CHAP-V1, and MS-CHAP-V2 protocols, the LDAP server must store the user’s password in clear text.

Backup LDAP servers must be the same version as the primary LDAP server. Also, we recommend that you specify the IP address of a backup LDAP server instead of its hostname, which might accelerate failover processing by eliminating the need to resolve the hostname to an IP address.

Configuring Authentication with an LDAP Server

To configure authentication with an LDAP server:

1.Select Authentication > Auth. Servers.

2.Select LDAP Server and click New Server to display the configuration page.

3.Complete the configuration as described in table.

4.Save the configuration.

Settings

Guidelines

Name

Specify a name to identify the server within the system.

Enable Domain Name(enabled)

Select this option to fetch a list of servers from the DNS server.

 

Domain Name

When you Enable Domain Name, specify the LDAP Domain name that can be mapped to domain controllers by DNS service.

Enable Domain Name (disabled)

Clear this option if you want to manually enter all the domain controllers host names.

LDAP Server: Specify the LDAP server name or the IP address.

Backup LDAP Server1: (Optional) Specify the parameters for backup LDAP server1.

The specified backup LDAP server is used for failover processing. The authentication request is first routed to the primary LDAP server, and then to the specified backup servers if the primary server is unreachable.

Backup LDAP Port1: Specify the parameters for backup LDAP port1.
Backup LDAP Server2: (Optional) Specify the parameters for backup LDAP server2.

LDAP Port

Specify the LDAP port for the LDAP server.

Default port number: 389 (unencrypted connection)

Default port number: 636 (SSL connection)

LDAP Server Type

Select the backend LDAP server type from the following choices:

Generic

Active Directory

iPlanet

Novell eDirectory

Profiler (Policy Secure only)

Connection

Select one of the following options for the connection to the LDAP server:

Unencrypted– The device sends the username and password to the LDAP Directory Service in clear text.

LDAPS– The device encrypts the data in the LDAP authentication session using the Secure Socket Layer (SSL) protocol before sending it to the LDAP Directory Service.

Start TLS– The device allows both secure and plain requests against an LDAP server on a single connection.

- If you select LDAPS or Start TLS, the Validate Certificate option is displayed for the configured LDAP server(s) and its referral servers. Select this option if the SSL connection uses digital certificate security.
- If you enable validation for the referral servers, make sure your network DNS supports reverse lookup zone.
- If you want to verify the server certificates, the root CA and Intermediate CAs must be imported as trusted CAs.

Connection Timeout (seconds)

Specify the time to wait for connection to the primary LDAP server, and then to each backup LDAP server.

Default: 15 seconds

Sarch Timeout (seconds)

Specify the time to wait for search results from a connected LDAP server.

Test Connection

(Optional) To verify the connection between Pulse Secure client and LDAP servers, click the Test Connection button.

We recommend using the Test Connection function only after saving changes on the LDAP Server Configuration page.

Authentication required?

Authentication required to search LDAP

Select this option to require authentication when performing search or password management operations.

- If you use Active Directory, you must select the Authentication required to search LDAP check box and provide the full DN and password of an account that can reach Active Directory.
- You can enable password management on any LDAP server.
- This feature enables users who authenticate through an LDAP server to manage their passwords through the system using the policies defined on the LDAP server. To enable password management on any LDAP server,you must provide primary and backup administrator accounts (with write privileges to the directory) for the administrator DN and backup administrator DN.

Admin DN

Specify the administrator DN for queries to the LDAP directory.

Password

Specify the password for the LDAP server.

Backup Admin DN

Specify the backup administrator DN for queries to the LDAP directory, as a fallback when primary Admin DN fails (due to account expiration). The interaction with LDAP directory stops when both primary and backup administrator accounts fail.

Backup Admin Password

Specify the backup administrator password for the LDAP server.

Finding user entries

 

Base DN

Specify the base DN under which the users are located. For example, dc=sales,dc=acme, dc=com.

Filter

Specify a unique variable that can be used to do a fine search in the tree. For example, samAccountname=<username> or cn=<username>.

Include <username> in the filter to use the username entered on the sign-in page for the search.

Specify a filter that returns 0 or 1 user DNs per user; the device uses the first DN returned if more than 1 DN is returned.

Remove Domain from Windows users names?

 

Strip domain from Windows username

Select this option to pass the username without the domain name to the LDAP server.

Enable Challenge-Response open protocols?

 

Enable Challenge-Response open protocols

Select this option if you want to use a challenge-response protocol for authentication.

By default, these protocols are disabled for LDAP servers because account management is not possible.

Determining group membership

 

Base DN

Specify the base DN to search for user groups.

Filter

Specify a unique variable which can be used to do a fine search in the tree. For example, samAccountname=<username> or cn=<GROUPNAME>.

Member Attribute

Specify all the members of a static group. For example, member or uniquemember (iPlanet specific).

Reverse group search

Select this option to start the search from the member instead of the group. This option is available only for Active Directory server types.

Query Attribute

Specify an LDAP query that returns the members of a dynamic group. For example, memberURL.

Nested Group Level

Specify how many levels within a group to search for the user.

The higher the number, the longer the query time, so we recommend that you specify to perform the search no more than two levels deep.

Nested Group Search

Select one of the following options:

Nested groups in Server Catalog–This option is faster because it can search within the implicit boundaries of the nested group.

Search all nested groups–With this option, the device searches the Server Catalog first. If the device finds no match in the catalog, then it queries LDAP to determine if a group member is a subgroup.

Displaying the User Accounts Table

To display user accounts:

1.Select Authentication > Auth. Servers.

2.Click the link for the authentication server you want to manage.

3.Click the Users tab to display the user accounts table.

The user accounts table includes entries for the accounts that have been created. The Last Sign-in Statistic column shows the last successful sign-in date and time for each user, the user’s IP address, and the agent or browser type and version.

4.Use the controls to search for users and manage user accounts:

To search for a specific user, enter a username in the Show users named box and click Update.

You can use an asterisk (*) as a wildcard, where * represents any number of zero or more characters. For example, to search for all usernames that contain the letters jo, enter *jo*. The search is case-sensitive. To display the entire list of accounts again, type * or delete the field’s contents and click Update.

To limit the number of users displayed on the page, enter a number in the Show N users box and click Update.

To terminate the user session and delete the account, select the check box next to the user account record and click Delete.