LDAP Server Access Configuration Fields

Follow these steps to configure the Oracle Enterprise Communications Broker to access one or more LDAP servers.

  1. Access the Modify LDAP config dialog by clicking the LDAP icon.
  2. State—Check the checkbox to enable your LDAP configuration.
  3. LDAP Servers—Enter the IP address(es) and optionally the port number(s) for each LDAP Server(s) you want to add to the LDAP configuration. Controls across the top of the dialog allow you to Add, Edit and Delete individual servers. The first server listed is considered the primary LDAP Server, and the remaining servers are considered the secondary LDAP Servers. The HUNT strategy is used to determine the active LDAP Server (where the Oracle Enterprise Communications Broker selects the first LDAP Server; if unreachable, it selects the second LDAP Server; if that is unreachable, it selects the third LDAP Server, etc). Default ports used are 389 (for LDAP over TCP) and 636 (LDAP over TLS). IP Address must be entered in dotted decimal format (0.0.0.0). Default is blank.
  4. Username—Enter the username that the LDAP bind request uses for authentication before access is granted to the LDAP Server. Valid values are alpha-numeric characters. Default is blank.
  5. Password—Enter the password to be paired with the username attribute, that the LDAP bind request uses for authentication before access is granted to the LDAP Server. Valid values are alpha-numeric characters. Default is blank.
  6. Ldap search base—Enter the base Directory Number you can use for LDAP search requests. Valid values are alpha-numeric characters. Default is blank.
  7. Timeout limit—Enter the maximum amount of time, in seconds, for which the Oracle Enterprise Communications Broker waits for LDAP requests from the LDAP server before timing out. When an LDAP response is not received from the LDAP server within the time specified, the request is retried again based on the max-request-timeouts parameter value. Valid values are 1 to 300 seconds. Default is 15.
  8. Max request timeouts—Enter the maximum number of times that the LDAP Server is sent LDAP requests before the Oracle Enterprise Communications Broker determines that the server is unreachable and terminates the TCP/TLS connection. When an LDAP response is not received within the time specified for the timeout-limit parameter value, the request is retried the number of times specified for this max-request-timeouts value. Valid values are 0 to 10. Default is 3.
  9. TCP keepalive —Specify whether or not the Oracle Enterprise Communications Broker keeps the TCP connection to the LPAD Server alive. Default is disabled. Valid values are:
    • enabled
    • disabled (default)
  10. Ldap sec type—Select the LDAP security type to use when the Oracle Enterprise Communications Broker accesses the LDAP server. This parameter enables the use of LDAP over TLS (LDAPS). If you set a value for this parameter, you must also specify an ldap-tls-profile value. Default is none. Valid values are:
    • none (default) - No LDAP security type specified
    • LDAPS - Method of securing LDAP communication using an SSL tunnel. This is denoted in LDAP URLs. The default port for LDAP over SSL is 636.

  11. Ldap TLS profile—Select the name of the Transport Layer Security (TLS) profile that the Oracle Enterprise Communications Broker uses when connecting to the LDAP Server. The ldap-sec-type must be set to LDAPS for this profile to apply. Valid values are alpha-numeric characters. Default is blank. See the Oracle ECB Administrator's Guide for instructions on how to create a TLS profile.
  12. Save and activate your changes when finished.