ldap-KerberosConfig

LDAP and Kerberos together make for a great combination. Kerberos manages credentials securely (authentication) while LDAP stores authoritative information about the accounts, such as what they are allowed to access (authorization), the user's full name and uid. You can add helpful things, such as an external email address or a room number in a structured way.

Figure 1. Kerberos Config properties


To access these properties, expand Config > Services > KerberosScheme and double-click Config.

PropertyValueDescription
Enable Connection Poolingtrue (default) or false
Enables (true) and disables (false) the use of a connection pool. To speed processing, LDAP servers maintain a pool of connections. A request from the system that uses an existing connection saves valuable processing time, which improves system performance. Do not change the default (true = enabled) setting unless you know what you are doing.
Connection URLldap://your.domain.net orldap://your.domain.net:nnn
Identifies the URL (your.domain.net) for the LDAP server. Standard LDAP ports are 389, or 636 (if using SSL). If the server uses a non-standard port, include the port (your.domain.net:nnn) in the URL, for example, ldap://your.domain.net.999.
SSLtrue or false
Enables (true) and disables (false) secure communication. If set to true, make sure that SSL (3.8) or TLS (4.0) is enabled in the station’s FoxService (for Workbench-to-station access) and WebService (for browser-to-station access). Note that in FoxService and WebService TLS must be enabled whether SSL is true here or not.
User Login AttrtextFor AD this value defaults to sAMAccountName
Identifies the specific attribute in the LDAP directory to store the LDAP user login name. For AD servers, this is always sAMAccountName. For OpenLDAP servers, it would be uid.
User Basedomain components
Identifies the sub-tree of the LDAP server in which users who can access this station are found. At the very least it must contain the domain components of the server’s domain, for example: DC=domain, CD=net.
Attr EmailEmail address (AD defaults to: mail)
Identifies the specific attribute in the LDAP directory to store the user’s LDAP email address. This value populates the Niagara user’s Email property.
Attr Full Nametext (The AD defaults to: name)
Identifies the specific attribute in the LDAP directory to store the user’s full name. This value populates the Niagara user’s Full Name property.
Attr Languagetwo-letter language code (AD defaults to blank)
Identifies the specific attribute in the LDAP directory to store the user’s language. This value populates the Niagara user’s Language property.
Attr Cell Phone Numbertelephone number (AD defaults to mobile)
Identifies the attribute in the LDAP directory that stores the user’s mobile phone number. This value populates the Niagara user’s Cell Phone Number property.
Attr Prototypetext (AD defaults to memberOf).
Identifies the User Prototype with which the system populates a new user’s local properties.

If this property is blank or the name does not match any user prototype, the system uses the Default Prototype to populate local user properties.

If a user belongs to multiple user groups (user prototypes), the top-to-bottom order of prototypes determines which prototype the system uses. If the value of a user prototype property changes, the system dynamically updates user properties accordingly.

Cache Expirationdate and time
Defines a future date after which the system no longer stores a user’s password in cache. When an LDAP server is unavailable a user can still log on with the cached credentials until this date and time.

This property applies to Kerberos authentication even though the station never receives the user’s password. Instead, the station verifies the corresponding Kerberos user ticket against the cached user information.

Connection Timeouttime
Determines the length of time the station attempts to connect to the LDAP server before the connection fails.

The station will not fail over to the next LDAP server until the first connection attempt is unresponsive for the amount of time specified in the connection timeout. This time should not be too short to cause false connection failures, but not so long as to cause excessive delays when a server is down.

RealmUPPERCASE lettersEXAMPLE.COM
Identifies the system on which the LDAP server resides. You get this information from your Kerberos administrator.
Key Distribution Centertext, for example: kd.example.com
Specifies the name of the Kerberos Key Distribution Center that the system contacts to get a ticket, which, like a key, is used to authenticate the user to the Niagara system. You get this information from your Kerberos administrator.
Station Kerberos Nametext
As part of securely delegating Kerberos tickets, this property represents the station as a user in the Kerberos database. If logging in only via Workbench, this user can be any user or service in the Kerberos directory.

However, if the user logs in via a browser, the user must be a service in the form: HTTP/service-Name.domain.com, where serviceName.domain.com is how the station is to be accessed in the browser, (for example, http://stationkerb1.mydomain.com).

The service name for the station Kerberos name typically omits a bit of the normal http URL syntax, for example: http/stationkerb1.mydomain.net instead of http://stationkerb1.mydomain.net. You may need to ask the Kerberos administrator to create the service for you in the Kerberos database.

Note: Kerberos is very particular about names. You must enter the station name in the “Station Kerberos Name” property exactly as it appears in the Kerberos database. Upper/lowercase can sometimes be an issue, so make sure you have an exact match.
Station Kerberos Passwordtext (defaults to blank)
Specifies the password for the Kerberos station user identified by the Station Kerberos Name property. If you are using a keytab file, you can leave this property blank.
Key Tab Filefile name
Defines the keytab file that contains a key table.

Kerberos services usually do not use a password to authenticate. Instead, they use a file. To authenticate from a web browser you must specify an associated service in the Station Kerberos Name property and reference a keytab file supplied by the Kerberos administrator.

You must copy that keytab file to this secure location on the Niagara 4 platform: protected_station_home/ldap. You need to create the ldap directory manually. For the KeyTab File property, select the keytab file from the drop-down. Again, if you are using a keytab, you can leave the Station Kerberos Password property blank (default).