LDAP

Generate the LDAP configuration file

  1. Run the configure command
Bash
Copy
  1. Expected output:
Bash
Copy
  1. If the file is already generated it will ask for the LDAP credentials to validate the connectivity and configurations. Which is mentioned in the below steps.

Edit the LDAP configuration

  1. Edit the file in path:
Bash
Copy
  1. Configure file for below properties:

    1. LDAP FQDN : FQDN where LDAP server is running

      1. host = [FQDN]
    2. If port 389 is being used then

      1. insecureNoSSL = true
    3. SSL root CA Certificate:__rootCA = [CERTIFICATE_FILE_PATH]

    4. bindDN : to be used for ldap search need to be member of admin group

    5. bindPW : password for entering in database, can be removed later once ldapgets enabled

    6. baseDN used for user search: Eg: (cn=users, cn=accounts, dc=accedata, dc=io)

    7. Filter used for the user search : Eg: (objectClass=person)

    8. baseDN used for group search: Eg: (cn= groups, cn=accounts, dc=acceldata, dc=io)

    9. Group Search: Object class used for group search: Eg: (objectClass= posixgroup)

Here is the command to check if user has search entry access and group access in LDAP directory:

Bash
Copy

Validate the LDAP User Credential and Configurations

  1. Run the configure command
Bash
Copy
  1. It will ask for the LDAP user credentials:
Bash
Copy
  1. If things went well, it will show the below confirmation message:
Bash
Copy
  1. Press ‘y' and press 'Enter’
  2. Expected output:
Bash
Copy

Deploy the Pulse LDAP addon

  1. Run the deploy addon command
Bash
Copy
  1. Select the LDAP from the list shown and press 'Enter':
Bash
Copy
  1. Expected output:
Bash
Copy

Push the updated “acceldata.conf“ to Pulse DB

  1. Run the deploy command
Bash
Copy
  1. It will ask for confirmations:
Bash
Copy
  1. Expected output:
Bash
Copy

Restart the Pulse Web UI service

  1. Run the restart command
Bash
Copy
  1. Open Pulse Web UI and create default roles.
  2. The “ops” role must be created and configured with the necessary access, as it will be automatically assigned to all incoming users with LDAP login. If you prefer more control over LDAP group mappings and permissions, you can create custom roles, assign the required permissions, and associate LDAP groups with those roles. Users belonging to these groups will automatically inherit the permissions assigned to their respective roles.
Bash
Copy

Following three new fields were added to the configuration:

Bash
Copy

This must be customized by the user based on their specific use case.

Enable SSL/TLS for LDAPS

For SSL setup in LDAPS, add the following code snippet to the configuration file.

  1. Fetch the root CA (PEM) file and place it in the following directory.
Bash
Copy
  1. Generate the ad-ldap container yaml file if it does not exist, by executing the following command.
Bash
Copy
  1. Please update the following properties.
Bash
Copy

Mount the root-ca file into the ad-ldap conf Volumes section.

Bash
Copy

Mount the root CA file in the ldap container by adding the following line to the Volumes section of the container.

Custom LDAP Configuration File

This section displays a sample active directory LDAP file.

Bash
Copy

Logs from ad-ldap container

Bash
Copy
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard