LDAP/AD Server Rule Configuration


 

SapphireIMS provides support to import all your user account information from an LDAP or AD server, Azure AD, OneLogin Cloud Directory and Google Workspace (formerly G Suite) . This import can also be scheduled so that the user information is periodically synchronized with the source. However the authentication of the users will happen from the corresponding source as the password is not downloaded into SapphireIMS. Also in this mode, single sign-on is enabled.

Note.gifNote: For setting credentials for Microsoft AD servers you need to select credential type as WMI and for other LDAP servers the credential type should be selected as LDAP.

 

Configure LDAP Rule in SapphireIMS

 

 1.    Click the 'Settings' tab. Under the 'User Management' section, click 'AD and LDAP Integration'

 2.       Click on 'Add' to add a new LDAP rule.

 

LDAP-Rule-Add.jpg

 

Serial No

   Field Name

Description

 

     1

LDAP Rule Name

Rule name for the LDAP configuration

 

     2

Job Processor

Select this field if you need to select the configured cloud connector plug-in for SapphireIMS. If no cloud connector is configured, default value of 'Local' will be taken and active directory or open LDAP integration will be done directly through the SapphireIMS server.

Notes:

1. Global settings key 'Single sign on setting for portal login' must be enabled for gateway authentication to take place.

2. In case of MSP edition, the registered probes are also listed along with the registered cloud connector plug-in or jump hosts. In the MSP setup, if the active directory or open LDAP server can be reached from the SapphireIMS probe server, then jump host is not required.

 

     3

Enable User Image Import

Enable this to import the user image from the Active Director or LDAP Server.

     4

Credential Profile

*Applicable for LDAP/AD server only*

Select the profile that is used to import users from the Microsoft Active Directory or LDAP server. This profile can be added from 'Settings > Asset and Inventory Management > Profile Manager'. Select 'Credential Type' as 'WMI' while adding the credentials profile for importing users from Microsoft Active Directory server and select 'LDAP' while adding the credentials profile for importing users from an LDAP server

     5

Host Name/IP Address

*Applicable for LDAP/AD  server only*

Name or IP Address of the host where Active Directory is installed

 

     6

Protocol Type

The protocol type can be specified among the following:

  • ADSI has been deprecated

  • LDAP (default)

  • Azure AD

  • OneLogin

  • Google Workspace

     7

Operating System

Specify if the LDAP server is running on Windows or a Linux

 

     8

App ID

*Applicable for Azure AD and OneLogin only*

The Client ID obtained from the Azure AD or OneLogin configuration

     9

Secret Key

*Applicable for Azure AD and OneLogin only*

The Secret Key obtained from the Azure AD or OneLogin configuration

     10

Directory ID

*Applicable for Azure AD only*

The Directory ID obtained from the Azure AD configuration

     11

G-Suite Email

*Applicable for Google Workspace only*

The Google Workspace Email ID

     12

Customer ID

*Applicable for Google Workspace only*

Enter the customer ID which is found in the Google Workspace account profile.

     13

Service Account Email

*Applicable for Google Workspace only*

The Service Account Email which is generated while creating the Service Account.

     14

Private Key Id

*Applicable for Google Workspace only*

The Private Key Id generated in the downloaded JSON file.

     15

Private Key

*Applicable for Google Workspace only*

The Private Key generated in the downloaded JSON file.

     16

Language

Select the default language which will be associated with the user

Note.gifNote: Enable the global settings key 'Multi language support type' to 1 in order to select the default language. If the value of the setting is 0 then this field does not appear.

 

     17

AD SapphireIMS Attribute Mapping

1. Check the box 'Set Default' if SapphireIMS fields should contain the same display name as active directory attributes.

2. Clear this box and select SapphireIMS fields to be displayed. You can map the AD Attributes like 'Display Name', 'Email' and 'Telephone Number' to fields in SapphireIMS by selecting from the drop down list on right hand side.

     18

Advanced Settings

If this option is selected the following menu line items will be displayed. Use this only if your LDAP is configured by overriding the default standard options

     19

Domain Full Name

Provide the fully qualified domain name

 

     20

Filter    

Can be empty. A filter specifies the conditions that must be met for a record to be included in the recordset (or collection) that results from a query to the AD/LDAP server. An LDAP filter has one or more clauses, each enclosed in parentheses. Each clause evaluates to either True or False. An LDAP syntax filter clause is in the following form:  (<AD Attribute><comparison operator><value>)

(<ADattributename>=<ADattributevalue>): Import only those AD users whose attribute value is equal to  <ADattributevalue>

(!(<ADattributename>=<ADattributevalue>)):Import only those AD users whose attribute value is not equal to <ADattributevalue>

This is further illustrated in the following examples

!(mail=test*): Import all users except for ones with primary e-mail addresses that begin with 'test'

((department=HR)): Import all users whose department is 'HR'

There can be multiple conditions a shown below

(department=HR)(!(mail=test*): import all users belonging to HR department and whose e-mail addresses do not begin with 'test'

 

For more information on filters, refer http://social.technet.microsoft.com/wiki/contents/articles/5392.active-directory-ldap-syntax-filters.aspx

 

    21

SSL      

Specify if SSL enabled, the port number gets reconfigured if this is enabled

 

    22

Port Number

LDAP Port (By default - 389. If SSL is enabled, then the default Port is 636)

 

 

 

Note.gifNote: Passwords are not imported from the LDAP/AD server and all authentication happens from the LDAP/AD server.  On logging in the first time, the user is taken to the 'Preferences' page where the user can enter the PIN and security question/answer. This is required to reset the password in future.

Note.gifNote:   Support for importing User Data from Multiple Domains along with SapphireIMS Web Portal and Mobile App based User Authentication across Multiple Domains in Microsoft and OpenLDAP Active Directory Integration is provided. Both “domainname\username” and “username@domainname” formats for Username are supported for the Active Directory Users to login to the SapphireIMS Web Portal and Mobile App.

Note.gifNote: The Global Settings Key 'Multi domain user error message' is used to change the error message when a multi domain user enters incorrect credentials while logging in. Refer to Settings->Advanced Settings->Global Settings to set the error message.

Note.gifNote: There is a Global Setting Key to restrict the import of Location and Department information for disabled users. Set the Global Settings Key "Restrict location and department info update for disabled users during AD sync" as 1 to restrict the import. Refer to Settings->Advanced Settings->Global Settings to set the error message.

 

Setting up Credentials and enabling Service Accounts in Google Workspace

 

This section provides the details for setting up the credentials and enabling service accounts in Google Workspace in order to allow user import from Google Workspace. You need a Google account to get started.

 

LDAP-GSuite-Console.jpg

 

LDAP-GSuite-ProjectList.jpg

 

LDAP-GSuite-ProjectCreate.jpg

 

 

Enabling Google Workspace API

 

LDAP-GSuite-EnableAPIService.jpg

 

LDAP-GSuite-WelcomeAPI.jpg

 

LDAP-GSuite-AdminSDKAPI-Enable.jpg

 

Configuring OAuth consent screen

 

LDAP-GSuite-OAuthConsent.jpg

 

LDAP-GSuite-OAuthAppReg.jpg

 

LDAP-GSuite-OAuthAppScopes.jpg

 

LDAP-GSuite-OAuthAddScope.jpg

 

https://www.googleapis.com/auth/admin.directory.group.member

https://www.googleapis.com/auth/admin.directory.group         

https://www.googleapis.com/auth/admin.directory.user

https://www.googleapis.com/auth/admin.directory.user.alias

https://www.googleapis.com/auth/admin.directory.user.security

LDAP-GSuite-OAuthListScope.jpg

 

Creating OAuth 2.0 Credentials

OAuth2-5.jpg

 

OAuth2-6.jpg

LDAP-GSuite-OAuthClientID.jpg

 

OAuth2-10.jpg

 

Creating Service Account Credentials

LDAP-GSuite-ServAccount.jpg

 

LDAP-GSuite-ServAccountList.jpg

 

LDAP-GSuite-ServAccountOpen.jpg

 

LDAP-GSuite-ServAccountKeys.jpg

 

LDAP-GSuite-ServAccountKeysCreate.jpg

 

LDAP-GSuite-ServAccountKeysSaved.jpg

 

 

Delegating Domain wide authority to the Service Account

LDAP-GSuite-AdminConsole.jpg

 

LDAP-GSuite-SecMenu.jpg

 

LDAP-GSuite-AdminAPIControl.jpg

 

LDAP-GSuite-AdminAPIControlList.jpg

LDAP-GSuite-AdminAPIAdd.jpg

https://www.googleapis.com/auth/admin.directory.group.member

https://www.googleapis.com/auth/admin.directory.group         

https://www.googleapis.com/auth/admin.directory.user

https://www.googleapis.com/auth/admin.directory.user.alias

https://www.googleapis.com/auth/admin.directory.user.security