Configuring secured LDAP in Adeptia Connect

To allow users to access Adeptia Connect over secured LDAP, you need to configure Secured LDAP in Adeptia Connect.

This page contains the following information:

Prerequisites

  • Installed LDAP Server.
  • Administrative rights in Adeptia Connect to enable LDAP Authentication and Authorization.
  • Adeptia Connect is certified with Windows Active Directory and Open LDAP server.
  • TLSv1.2 should be enabled on LDAP Server.

Configuring secured LDAP

  1. Import the LDAP Server certificate in AIS cacert (/Serverkernel/etc/truststore/cacerts) using below command.

    keytool -import -trustcacerts -alias <<ANY_ALIAS_NAME>> -file "<<CERTIFICATE_FILE_PATH>>" -keystore "<<AIS_CACERT_PATH>>"

    For example,
    keytool -import -trustcacerts -alias ldapssl -file "C:\Users\administrator.ADEPTIA\Desktop\adeptia.org.cer" -keystore "C:\Program Files\AdeptiaConnect-3.3\ConnectServer\AdeptiaServer\ServerKernel\etc\truststore\cacerts"
    1. After importing the LDAP Server certificate, you will be prompted to enter the keystore password. The default password is changeit.
    2. Enter yes, when prompted to trust the certificate.

  2. Follow the below steps to configure LDAP properties.
    1. Log in to Adeptia Connect.
    2. Click Accounts > Settings.
    3. Expand the Server Node Settings in the left panel.
    4. Select the server node.
    5. Click Edit.
    6. Expand Systems > LDAP Authentication.
    7. Modify the value for the abpm.ldap.provider.url property.

      1. Set the protocol to ldaps.
      2. Set the port number for SSL request. By default, the port number is 636.
        For example,
        ldaps://adsrv014.adeptia.org:636
    8. Set the value of the abpm.ldap.enableLdapOverSSL property to yes.

  3. Click Save.
  4. To reload the configuration, click Reload Configuration link.
    A confirmation message is displayed that the configuration has been reloaded.