Jump to: navigation, search

Deploying LDAP External Authentication

Task Summary

The following Task Summary lists the tasks required to deploy LDAP in your configuration.

Deploying LDAP External Authentication

Task

Related Procedures and Information

Install Configuration Server and deploy LDAP during the installation.

This Configuration Server can be the primary or backup configuration server in a redundant configuration, or the Master Configuration Server in a geographically distributed configuration.

Use the procedure Deploying LDAP during Configuration Server installation.

(Optional) Configure additional LDAP Servers.

If you are using multiple LDAP servers, configure them on the Options tab of the Tenant object (preferred) or of the Configuration Server object. Refer to Configuring LDAP Servers.

(optional) Install as many Configuration Servers as required, deploying LDAP during the installation.

If you are deploying LDAP in a geographically distributed configuration, install each Configuration Server Proxy using the procedure Deploying LDAP during Configuration Server installation.

Deploying LDAP

Use the following procedure to deploy LDAP while you are installing Configuration Server or Configuration Server Proxy.

Deploying LDAP during Configuration Server installation

Purpose

To deploy LDAP while installing Configuration Server or Configuration Server Proxy.

Start

  1. Begin installing Configuration Server or Configuration Server Proxy (multi-tenant or single-tenant).
  2. On the Configuration Server Run Mode page, select one of the following, as appropriate:
  3. Configuration Server Master Primary —If you are installing a Master or Primary Configuration Server.

    Configuration Server Proxy —If you are installing a Configuration Server Proxy.

  4. Continue installing Configuration Server or Configuration Server Proxy, as appropriate.
  5. On the Configuration Server External Authentication page, select Lightweight Directory Access Protocol (LDAP).
  6. On the LDAP Server Access URL page, enter the URL that the Configuration Server or Configuration Server Proxy will use to connect to the LDAP server.
  7. If you are going to use multiple LDAP authentication servers, specify the first LDAP server on this page. After Configuration Server or Configuration Server Proxy starts up for the first time, you can enter additional LDAP servers on the Options tab of the Configuration Server or Configuration Server Application object.

    Important
    If you are going to use external authentication at the Tenant level, or are going to have a geographically distributed deployment of Configuration Servers, you can ignore this step, and configure the servers at the Tenant level after Configuration Server has been started.
  8. Finish installing Configuration Server or Configuration Server Proxy.

End

Configuration Server Options

Important
There might be instances in which Configuration Server or Configuration Server Proxy, and the external authentication system interpret a blank password differently. To eliminate this possibility, make sure that Configuration Server does not accept a blank password as valid. Refer to the Framework Configuration Options Reference Manual for instructions on configuring the allow-empty-password option to disallow a blank password.

If you installed the LDAP pluggable modules during installation of a new Master Configuration Server, the following configuration option sections and options are added to the configuration file, and are copied into the database when Configuration Server starts (see Configuring the Master Configuration Server), as follows:

        [authentication] library=gauth_ldap
        [gauth_ldap] ldap_url=<URL as entered during installation>

When you install the LDAP pluggable module on Configuration Server Proxy, you must manually add the same two sections and options to the Application object:

The library option specifies gauth_ldap as the section that specifies the external authentication parameters.

The ldap-url option specifies the URL of the LDAP server and directory that you entered during installation. Both values are set automatically.

At this point, these two sections indicate that LDAP external authentication is to be used, and they are all that is required to use LDAP with one LDAP server that accepts anonymous LDAP binding. If your LDAP server requires authentication to perform searches using a query, specified in the option ldap-url (see ldap-url), you must set the app-user and password options (see app-user) before you can use external authentication.

To maintain backwards compatibility, if an ldapclient.conf file exists, the Master Configuration Server will also read the contents of that file and translate those settings into Configuration Server options at first startup. also storing them in the database. Any changes to that file will also be ignored at subsequent startups.

IMPORTANT: If a legacy ldapclient.conf or confserv.conf file from a previous version exists, you must do the following before the first startup of the Master Configuration Server:

If either of the files contains passwords, make sure that both of the following conditions are true:

  1. The passwords are encrypted.
  2. The confserv section of the confserv.conf file contains the option encryption=true.

If either of these conditions are omitted, Configuration Server may import the legacy passwords incorrectly.

If the legacy ldapclient.conf file contains multiple servers, organize the servers list in the order in which the servers are indexed, that is gauth_ldap , gauth_ldap _1 , gauth-ldap_2 , and so on. If you don’t do this, Configuration Server will index the servers in the order in which they are read.

Configuring LDAP Servers

Configuration Server supports up to ten LDAP authorization modules, or servers.

Important
Redundant RACF servers are not supported.

When you install Configuration Server, you can configure one LDAP server during the installation process. If you are using multiple LDAP Servers, you configure those additional LDAP servers on the Options tab of the Configuration Server object.

Important
If you are going to use per-Tenant external authentication targeting distributed deployment, Genesys recommends that you configure the LDAP servers at the Tenant level, as described in Deploying LDAP on Configuration Server Proxy.

On the Options tab, there is one section for each LDAP server. The name of each section must be unique, and should appear in the order in which they are indexed. The first section is named [gauth_ldap] , as described previously. Genesys recommends naming each additional section gauth_ldap_n] , where n is a numeric index in the range of 1 to 9 for each LDAP server.

A section for a single server has a format like this:

      [gauth_ldap] or [gauth_ldap_n] ldap-url= <value> app-user= <value> password= <value> cacert-path= <value> cert-path= <value> key-path= <value>

The options, or server parameters, in a section are listed in LDAP Server Parameters, and described in detail starting on Configuration Options.

LDAP Server Parameters

Parameter

Definition of value

ldap-url

URL used to access LDAP server

app-user

Distinguished name of the application user

password

Application user password

cacert-path

Path to CA certificate for LDAP server

cert-path

Path to certificate of client’s key

key-path

Path to client’s private key

idle-timeout

Time interval that the connection to the LDAP server will be kept open if there are no more requests

retry-attempts

Number of authorization retries that will be generated by Configuration Server if the LDAP server does not respond

retry-interval

Time that Configuration Server waits for an authorization reply from the LDAP server.

connect-timeout

Initial timeout after which Configuration Server deems the specified LDAP server is not available.

When you are finished configuring all LDAP servers, the Options tab will contain one or more sections that look like this, in addition to the mandatory gauth_ldap section for the first server.:

      [gauth_ldap_1] ldaps://fram.us.int.vcorp.com:636/ou=Eng,o=vcorp,c=us??sub?(mail=X) app-user=cn=Manager,o=vcorp,c=us password=12345ABC9 cacert-path=keys/server.arm cert-path=keys/client.arm key-path=keys/private.pem idle-timeout= 5 retry-attempts=3 retry-interval=10 connect-timeout=10

Each section will have a different numeric identifier.

Deploying LDAP on Configuration Server Proxy

In geographically distributed systems prior to release 8.1, LDAP external authentication was configured only on the master Configuration Server, and each Configuration Server Proxy passed authentication requests to it.

Starting in release 8.1, LDAP External Authentication can be configured on the master Configuration Server and on each Configuration Server Proxy. This allows each Configuration Server Proxy to process authentication requests itself, without passing them on to the master Configuration Server. Use the procedure Deploying LDAP during Configuration Server installation.

This page was last edited on August 1, 2014, at 14:21.
Comments or questions about this documentation? Contact us for support!