Configuring LDAP authentication for an Analyzer or a Collector

When you configure authentication between your LDAP server and the Real User Analyzer and Real User Collector components, users are authenticated by the LDAP server and they acquire user roles established by the Administrator.

  • If you enable automatic account creation, the Analyzer and Collector components create accounts for users the first time they log on. If you do not change the default user role, users log on with Observer permission. 
  • If you do not enable automatic account creation, you must manually create the user accounts in the Analyzer and Collector. 

To configure LDAP authentication for the Analyzer and Collector, complete the following procedures on each component:

  1. To enable authentication and authorization for an Analyzer or a Collector
  2. To configure LDAP authentication for an Analyzer or Collector

To enable authentication and authorization for an Analyzer or a Collector

To perform this procedure, you must have Security-level access. 
  1. Open Administration > Security settings > Account policies page.

  2. In the Device access section, click Enable for LDAP authentication and authorization.

  3. On the Action menu for LDAP authentication and authorization, click Edit.

    The Edit Automatic account creation policy pop-up appears.

  4. Ensure that the Automatically create Real User Analyzer accounts for authenticated and authorized LDAP users box is selected.

    If you do not select this box, the Analyzer and Collector accounts are not automatically created for your LDAP users, and you must create the user accounts in the Analyzer and Collector.

  5. Click Save.

To configure LDAP authentication for an Analyzer or Collector

To perform this procedure, you must have Administrator-level access, or higher.

  1. On the Administration page, select General Settings > Accounts and LDAP management, and select the LDAP settings view.

  2. In the Directory Server section, select Edit from the Action menu, and add information specific to your LDAP server:
    1. In the Host box, enter the host name or IP address of the server where the LDAP directory resides (The possible values are: or 2001:500:100:1222:250:56ff:fe8f:5b1f or
    2. In the Port box, enter the TCP port of the host server (indicated in the Host box). The standard port for LDAP is port 389 for non-SSL connections and 636 for SSL connections.
    3. From the Authentication list, select the authentication for the system to use, Simple (username & password) or Anonymous.
    4. If you selected simple authentication, complete the following steps; otherwise, skip to step 3:
      1. In the Search username (bind DN) box, enter the name of the user account permitted to search the LDAP directory within the defined search base. Use the DN format — for example, cn=Administrator,cn=Users,dc=domain,dc=com.
      2. In the Password box, enter the password for the account on the directory server that corresponds to the user account in the Search User Name (bind DN) box.
    5. In the Connection security level list, select the type of communication, Non-Secure or LDAPS (Secure LDAP, also known as LDAP over SSL).
    6. (Optional) If you selected LDAPS in the Connection security level list, select Allow SSL connection to LDAP server using self-signed certificate unless your organization requires an X.509 certificate (also known as an SSL certificate) purchased from a commercial Certificate Authority (CA).
    7. In the Connection timeout box, specify the length of time that the system waits before it declares an error on the connection.
  3. (Optional) Click Test Server.
    A message indicates success or failure because of errors.
  4. In the User lookup for authentication section, add information to enable the Analyzer to look up users that are registered on the LDAP server:

    1. In the Base DN box, enter the base distinguished name (DN) to indicate where you want to begin the search in the LDAP directory. An LDAP directory is arranged in tree fashion, with a root and branches off this root. The base DN indicates at which node to start the search.
    2. In the Filter box, enter the query string that will return the records that you want to see.
    3. In the Filter Scope list, select the starting point of a search and the depth from the base DN to which the search should occur:
      • Base searches only the entry at the base DN, resulting in only that entry being returned (if it also meets the search filter criteria).
      • One Level searches all entries that are one level under the base DN (excluding the base DN).
      • Subtree searches all entries at all levels under and including the specified base DN.
    4. In the Username attribute box, enter a single LDAP user attribute that the system uses for the lookup — for example cn. It can be any attribute configured on the LDAP server.
    5. In the Member Attribute box, enter the name of the member attribute that contains the list of users in the group.
  5. (Optional) Click Test lookup.
    If the server and lookup are configured correctly, a list of LDAP users appears in a new window.
  6. Click Save

Where to go from here

Select one of the following options:

Related topics

Configuring role-mapping rules for an Analyzer or a Collector

Using LDAP authentication and authorization for the Analyzer or Collector

Was this page helpful? Yes No Submitting... Thank you