Managing Security > Using LDAP and Active Directory for Single Sign-On |
You can use your existing LDAP or Active Directory® with ActiveReports 9 Server so that your users can log in with their existing user names and passwords, and so that you can use existing groups to provide access to specific data.
Note: ActiveReports 9 Server supports OpenLDAP v2.3 or later. Earlier versions are not supported because they do not have a MemberOf attribute. |
To map your user directory to ActiveReports 9 Server, you specify LDAP (Active Directory) as your custom security provider, and set properties to give ActiveReports 9 Server access to it. These properties are described in the table below.
Security provider properties table
Property | Description | ||
---|---|---|---|
LDAP Server URL (required) |
The URL to the directory where you can find users. The syntax is: ldap://host:port/domain
In this example, example.org is the name of the server answering LDAP queries, 888 is a non-standard port used on the LDAP server, and grapecity.net is the ActiveDirectory domain. |
||
LDAP Admin User (required) |
The name or DN (distinguished name) of the user under which the LDAP connection is established. This user is also used to implement the ISecurityProvider.GetAdminContext method when you add a custom entity.
|
||
LDAP Admin Password (required) | The password associated with the administrative user on the LDAP server. Example: ***** |
||
User Name Attribute (optional) | By default, this value is samaccountname and specifies the LDAP attribute to use in resolving the user name passed in the ISecurityProvider.GetUserToken method. Example: uid |
||
User Display Name Attribute (optional) | By default, this value is displayName and specifies the LDAP attribute to use in resolving the user-friendly name with the ISecurityProvider.GetUserDescription method. Example: sn |
||
User Email Attribute (optional) | By default, this value is mail and specifies the LDAP attribute to use in resolving the user e-mail with the ISecurityProvider.GetUserDescription method. Example: mail |
||
Define Mappings | Description | ||
User Context Attribute Name | LDAP User Attribute Name |
To configure ActiveReports 9 Server to use your LDAP or Active Directory
To test your custom security provider
You can place percent signs around a UserContext attribute to use it in a connection string when you create a model. This is useful when each tenant in a multi-tenant application has a separate database, and you need to supply a dynamic value for the database.
Provider=SQLOLEDB.1;Data Source=HQ;Initial Catalog=%TenantDatabase%; User Id=myUsername;Password=myPassword;
When you create a security filter, you can re-use it for other entities that contain the attribute on which the filter expression is based.
To create a new security filter for row-level security
From the Administrator Dashboard, in the Administration section on the left, click Models. The Models list appears.
To use UserContext attributes from LDAP or ActiveDirectory in a connection string
You can place percent signs around a UserContext attribute to use it in a connection string when you create a model. This is useful when each tenant in a multi-tenant application has a separate database, and you need to supply a dynamic value for the database.
Provider=SQLOLEDB.1;Data Source=HQ;Initial Catalog=%TenantDatabase%; User Id=myUsername;Password=myPassword;