Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 163

After their sessions have expired, users can no longer log in to

Page 163 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 47. LDAP Settings (Continued) Setting Description Group Members This field is optional. The attribute that is used to identify the members of a group. Attribute For an Active Directory, enter member. For OpenLDAP, you can enter a customized attribute to identify the members of a group. Additional Filter This field is optional. A filter that is used when searching the LDAP server for matching entries while excluding others. (Use the format described by RFC 2254.) The following search term examples match users only: Active Directory: objectClass=user Open LDAP: objectClass=posixAccount 3. Click Test to verify that the LDAP server can actually function with the LDAP settings that you have specified. The automated test procedure checks the connection to the LDAP server; the bind DN, and the bind password. If any settings require changes, you are notified at the end of the automated test procedure. Note: If the automated test procedure returns the message "LDAP server test passed but size limit exceeded," only a limited number of entries (for example, 1000) was returned after the LDAP server was queried. To ensure that the lookup results include all users and groups, set larger values in the LDAP server. Another workaround is to use a specific search name or a name with a wildcard in the lookup process, so that the subset of the entire list is returned in the lookup result. 4. Click Add to save your settings. The LDAP or Active Directory domain and server are added to the List of LDAP table. To delete a domain and server from the List of LDAP table, click the Delete table button in the Action column for the domain and server that you want to delete. WARNING! After their sessions have expired, users can no longer log in to the STM if the domain that has been assigned to them is the domain that you deleted. Chapter 5. Managing Users, Groups, and Authentication | 163

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 5.
Managing Users, Groups, and Authentication
|
163
ProSecure Web/Email Security Threat Management (STM) Appliance
3.
Click
Test
to verify that the LDAP server can actually function with the LDAP settings that
you have specified. The automated test procedure checks the connection to the LDAP
server; the bind DN, and the bind password. If any settings require changes, you are notified
at the end of the automated test procedure.
Note:
If the automated test procedure returns the message “LDAP server
test passed but size limit exceeded,” only a limited number of entries
(for example, 1000) was returned after the LDAP server was
queried. To ensure that the lookup results include all users and
groups, set larger values in the LDAP server. Another workaround is
to use a specific search name or a name with a wildcard in the
lookup process, so that the subset of the entire list is returned in the
lookup result.
4.
Click
Add
to save your settings. The LDAP or Active Directory domain and server are added
to the List of LDAP table.
To delete a domain and server from the List of LDAP table, click the
Delete
table button in the
Action column for the domain and server that you want to delete.
WARNING!
After their sessions have expired, users can no longer log in to the
STM if the domain that has been assigned to them is the domain
that you deleted.
Group Members
Attribute
This field is optional. The attribute that is used to identify the members of a group.
For an Active Directory, enter
member
.
For OpenLDAP, you can enter a customized attribute to identify the members of a group.
Additional Filter
This field is optional. A filter that is used when searching the LDAP server for matching
entries while excluding others. (Use the format described by RFC 2254.)
The following search term examples match users only:
Active Directory: objectClass=user
Open LDAP: objectClass=posixAccount
Table 47.
LDAP Settings (Continued)
Setting
Description