Configuring an LDAP Directory Server Collector
You configure Workload Security to collect user attributes from LDAP Directory servers.
-
You must be a Data Infrastructure Insights Administrator or Account Owner to perform this task.
-
You must have the IP address of the server hosting the LDAP Directory server.
-
An Agent must be configured before you configure an LDAP Directory connector.
-
In the Workload Security menu, click:
Collectors > User Directory Collectors > + User Directory Collector and select LDAP Directory ServerThe system displays the Add User Directory screen.
Configure the User Directory Collector by entering the required data in the following tables:
Name |
Description |
Name |
Unique name for the user directory. For example GlobalLDAPCollector |
Agent |
Select a configured agent from the list |
Server IP/Domain Name |
IP address or Fully-Qualified Domain Name (FQDN) of server hosting the LDAP Directory Server |
Search Base |
Search Base of the LDAP server |
Bind DN |
User permitted to search the directory. For example: |
--accounts |
--users |
--john |
--anna |
BIND password |
Directory server password (i.e. password for username used in Bind DN) |
Protocol |
ldap, ldaps, ldap-start-tls |
Ports |
Select port |
Enter the following Directory Server required attributes if the default attribute names have been modified in LDAP Directory Server. Most often these attributes names are not modified in LDAP Directory Server, in which case you can simply proceed with the default attribute name.
Attributes |
Attribute name in Directory Server |
Display Name |
name |
UNIXID |
uidnumber |
User Name |
uid |
Click Include Optional Attributes to add any of the following attributes:
Attributes |
Attribute Name in Directory Server |
Email Address |
|
Telephone Number |
telephonenumber |
Role |
title |
Country |
co |
State |
state |
Department |
departmentnumber |
Photo |
photo |
ManagerDN |
manager |
Groups |
memberOf |
Testing Your User Directory Collector Configuration
You can validate LDAP User Permissions and Attribute Definitions using the following procedures:
-
Use the following command to validate Workload Security LDAP user permission:
ldapsearch -D "uid=john ,cn=users,cn=accounts,dc=dorp,dc=company,dc=com" -W -x -LLL -o ldif-wrap=no -b "cn=accounts,dc=dorp,dc=company,dc=com" -H ldap://vmwipaapp08.dorp.company.com
-
Use LDAP Explorer to navigate an LDAP database, view object properties and attributes, view permissions, view an object's schema, execute sophisticated searches that you can save and re-execute.
-
Install LDAP Explorer (http://ldaptool.sourceforge.net/) or Java LDAP Explorer (http://jxplorer.org/) on any windows machine which can connect to the LDAP Server.
-
Connect to the LDAP server using the username/password of the LDAP directory server.
-
Troubleshooting LDAP Directory Collector Configuration Errors
The following table describes known problems and resolutions that can occur during collector configuration:
Problem: | Resolution: |
---|---|
Adding an LDAP Directory connector results in the ‘Error’ state. Error says, “Invalid credentials provided for LDAP server”. |
Incorrect Bind DN or Bind Password or Search Base provided. Edit and provide the correct information. |
Adding an LDAP Directory connector results in the ‘Error’ state. Error says, “Failed to get the object corresponding to DN=DC=hq,DC=domainname,DC=com provided as forest name.” |
Incorrect Search Base provided. Edit and provide the correct forest name. |
The optional attributes of domain user are not appearing in the Workload Security User Profile page. |
This is likely due to a mismatch between the names of optional attributes added in CloudSecure and the actual attribute names in Active Directory. Fields are case sensitive. Edit and provide the correct optional attribute name(s). |
Data collector in error state with "Failed to retrieve LDAP users. Reason for failure: Cannot connect on the server, the connection is null" |
Restart the collector by clicking on the Restart button. |
Adding an LDAP Directory connector results in the ‘Error’ state. |
Ensure you have provided valid values for the required fields (Server, forest-name, bind-DN, bind-Password). |
Adding an LDAP Directory connector results in the ‘RETRYING’ state. Shows error “Failed to determine the health of the collector hence retrying again” |
Ensure correct Server IP and Search Base is provided |
While adding LDAP directory the following error is shown: |
Ensure correct Server IP and Search Base is provided |
Adding an LDAP Directory connector results in the ‘RETRYING’ state. Shows error “Unable to define state of the collector,reason Tcp command [Connect(localhost:35012,None,List(),Some(,seconds),true)] failed because of java.net.ConnectionException:Connection refused.” |
Incorrect IP or FQDN provided for the AD Server. Edit and provide the correct IP address or FQDN. |
Adding an LDAP Directory connector results in the ‘Error’ state. Error says, “Failed to establish LDAP connection”. |
Incorrect IP or FQDN provided for the LDAP Server. Edit and provide the correct IP address or FQDN. |
Adding an LDAP Directory connector results in the ‘Error’ state. Error says, “Failed to load the settings. Reason: Datasource configuration has an error. Specific reason: /connector/conf/application.conf: 70: ldap.ldap-port has type STRING rather than NUMBER” |
Incorrect value for Port provided. Try using the default port values or the correct port number for the AD server. |
I started with the mandatory attributes, and it worked. After adding the optional ones, the optional attributes data is not getting fetched from AD. |
This is likely due to a mismatch between the optional attributes added in CloudSecure and the actual attribute names in Active Directory. Edit and provide the correct mandatory or optional attribute name. |
After restarting the collector, when will the LDAP sync happen? |
LDAP sync will happen immediately after the collector restarts. It will take approximately 15 minutes to fetch user data of approximately 300K users, and is refreshed every 12 hours automatically. |
User Data is synced from LDAP to CloudSecure. When will the data be deleted? |
User data is retained for 13months in case of no refresh. If the tenant is deleted then the data will be deleted. |
LDAP Directory connector results in the ‘Error’ state. "Connector is in error state. Service name: usersLdap. Reason for failure: Failed to retrieve LDAP users. Reason for failure: 80090308: LdapErr: DSID-0C090453, comment: AcceptSecurityContext error, data 52e, v3839" |
Incorrect forest name provided. See above on how to provide the correct forest name. |
Telephone number is not getting populated in the user profile page. |
This is most likely due to an attribute mapping problem with the Active Directory. |
If encryption certificate (SSL) is enabled on the Active Directory (AD) Server, the Workload Security User Directory Collector can not connect to the AD Server. |
Disable AD Server encryption before Configuring a User Directory Collector. |