...
Expand | ||
---|---|---|
| ||
To secure the LDAP component and its it's logs, create a #ldap Component Role in Iguana Settings > Roles to match up with the #ldap component tagTag. Using a component tag matched with a role tag, we can restrict the access to interact with the LDAP component to only the admin user and those users with the #ldap Role assigned to them. Note: You can use any naming convention required to match a specific AD Group that exists, instead of #ldap. Only users in this group will have full access to the LDAP Authenticator component. The #ldap Role should have all permissions applied: |
...
Expand | ||
---|---|---|
| ||
Users can now login to Iguana using their Active Directory credentials! The component will start automatically and run whenever a user logs in to Iguana. The Iguana Service account will try to authenticate the user credentials using the Active Directory first. When logging in, you must use your fully qualified name, ie. user@interfaceware.biz. Active Directory User Principal Name (UPN) as the username and password. UPN uses the standard format: When logged in as an externally authenticated user, you’ll see that any roles matching Active Directory groups are applied. |
...