...
Expand | ||
---|---|---|
| ||
To secure the LDAP component and its logs, create a #ldap Component Role in Iguana Settings > Roles to match up with the #ldap component tag. Using a component tag matched with a role tag, we can restrict the access to interact with the LDAP component to only the admin user and those users with the #ldap Role assigned to them. The #ldap Role should have the following all permissions applied: |
Expand | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||
The component uses curl to query the active directory server. For Windows, a version of the curl binary is shipped with the component. For linux, if your system does not have a version of curl that supports ldap, follow the directions at the bottom to build curl. The steps below show building curl from source for Amazon Linux. For other flavours of linux, adjust the commands accordingly. Step 1: Get the latest curl download from the curl website.
Step 2: Use tar to extract the files.
Step 3: cd into the curl folder.
Step 4: Install gcc if needed.
Step 5: Install openldap-devel.x86_64 if needed.
Step 6: Install openssl-devel.x86_64 if needed.
Step 7: Run the command to configure and enable ldap.
Step 8: Compile the source code.
Step 9: Install source code.
Step 10: Check curl version and make sure LDAP is present in the Protocols list.
|
...