HP 3PAR StoreServ 7400 2-node HP 3PAR Management Console 4.3.0 Software User&a - Page 78

The LDAP Authorization Screen

Page 78 highlights

Group Authentication Parameters Field Binding Use SSL SASL Mechanism LDAP Server Name Kerberos Realm Kerberos Server IP Accounts DN Account Object Class Account Name Attribute Member Attribute Group Object Class Certificate Version (shown if the value of the Use Certificate field Issued to is Yes.) Issued by Valid from Description Indicates the type of binding: Simple or SASL. Indicates whether binding with SSL is used. Indicates the binding mechanism used. PLAIN - Similar to simple binding where the username and password are sent directly to the LDAP server for authentication (default). DIGEST-MD5 - The LDAP server sends the LDAP client one-time data that is encrypted by the client and returned to the server using a method that proves the client knows the user's password without actually having to send the password. GSSAPI - Obtains a ticket from the Kerberos server that validates the user's identity. The ticket is then sent to the LDAP server for authentication. The name of the host LDAP server. Indicates the numeric IP Address of the Kerberos server if different from the LDAP server. The IP address of the Kerberos server, if different than the LDAP server. Indicates the base of the subtree in the DIT to search for objects that hold account information. It is mutually exclusive with Group DN. The objectClass attribute of an account object. (The default is user.) The attribute of an account object that holds the user's username. (The default is sAMAccountName.) The attribute that holds the name of a group of which the user is a member.(The default is memberOf.) Indicates the objectClass attribute of a group object. (The default is group.) The version number of the certificate. Who the certificate is issued to. Who the certificate is issued by. Dates the certificate is valid. The LDAP Authorization Screen The Authorization screen displays the Authorization Group and Group Distinguished Name of all authorized LDAP users. NOTE: This screen must be displayed in order to enable the Test LDAP Connection button on the toolbar. 78 Managing LDAP with Security Manager

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424

Description
Field
Group
Indicates the type of binding: Simple or SASL.
Binding
Authentication
Parameters
Indicates whether binding with SSL is used.
Use SSL
Indicates the binding mechanism used.
SASL Mechanism
PLAIN
– Similar to simple binding where the username and
password are sent directly to the LDAP server for authentication
(default).
DIGEST-MD5
– The LDAP server sends the LDAP client one-time
data that is encrypted by the client and returned to the server
using a method that proves the client knows the user's password
without actually having to send the password.
GSSAPI
– Obtains a ticket from the Kerberos server that validates
the user's identity. The ticket is then sent to the LDAP server for
authentication.
The name of the host LDAP server.
LDAP Server Name
Indicates the numeric IP Address of the Kerberos server if
different from the LDAP server.
Kerberos Realm
The IP address of the Kerberos server, if different than the LDAP
server.
Kerberos Server IP
Indicates the base of the subtree in the DIT to search for objects
that hold account information. It is mutually exclusive with Group
DN.
Accounts DN
The objectClass attribute of an account object. (The default is
user.)
Account Object Class
The attribute of an account object that holds the user's username.
(The default is sAMAccountName.)
Account Name Attribute
The attribute that holds the name of a group of which the user
is a member.(The default is memberOf.)
Member Attribute
Indicates the objectClass attribute of a group object. (The default
is group.)
Group Object Class
The version number of the certificate.
Version
Certificate
(shown if the value of
the Use Certificate field
is Yes.)
Who the certificate is issued to.
Issued to
Who the certificate is issued by.
Issued by
Dates the certificate is valid.
Valid from
The LDAP Authorization Screen
The Authorization screen displays the Authorization Group and Group Distinguished Name of all
authorized LDAP users.
NOTE:
This screen must be displayed in order to enable the Test LDAP Connection button on
the toolbar.
78
Managing LDAP with Security Manager