Configuring Apache for Authenticating with LDAP Service
To enable external authorization you are required to have NGINX Web Server that provides external authentication and is optional. You can also have a webserver that supports External Authentication like Apache.
The default installation supports IPv6 only. Configurations are necessary for proxies and repos. If there are any, see Configuring Proxies and Repos.
Note:
On a SELinux enabled machine, for External Authentication, do not copy any
modified pld.conf
file from a different location and replace it
with an existing file as SELinux blocks access to such files.
Instead, edit the pld.conf
file contents directly using the VI
editor.
The following procedure explains configuring external authentication using Apache Web Server as it is widely used.
To configure Apache in Session Monitor for authenticating with LDAP service:
The httpd server of Session Monitor has been configured for external authentication.
When you open the Session Monitor in web browser, the external authentication pop-up appears. On providing the correct LDAP user credentials, the user will be logged in successfully.
pld.conf File Details
Configuring Apache for Authenticating with LDAP Service requires you to edit
the pld.conf
file. Here, you can find the descriptions for the
parameters that are edited and the optional parameters.
Table 2-2 pld.conf file parameters
Parameters | Description |
---|---|
<LDAP_Server> | The LDAP server name |
"ldap://ldap-server/dc=example,dc=org?uid?one" | The LDAP server IP address to which the authentication request is sent by Session Monitor. As DC and CN are LDAP specific, check the DC and CN values with your Local LDAP configuration. |
<password> | The password for LDAP server to which authentication to the specific user is to be processed. It should be a Hashed Password. |
AuthName | "OCSM COM” is the default name provided. It can be modified to any convenient name. |
{AUTHENTICATE_gecos}e (optional) | gecos is a parameter on your LDAP
Server that stores the permissions for the user. As this is LDAP
specific, check your local LDAP configuration. If permissions are
defined for your user, then you can umcomment this line and change
the parameter name from gecos to the appropriate name defined in
your LDAP. When you log in, Operations Monitor validates the
permission received and then allows User Login.
|
{AUTHENTICATE_employeeType}e | Parameter on your LDAP Server that stores the Role for the User. As this is LDAP specific, check with your local LDAP configuration. If roles are defined for your user, then you can umcomment this line and change the parameter name from employee to the appropriate name defined in your LDAP. When you log in, Operations Monitor validates the role received and then allows User Login. |
Configuring Secure LDAP (LADPS) Support
To configure LDAPS support, follow these steps: