Previous Topic

Next Topic

Book Contents

Book Index

Configuring LDAP Authentication

LDAP/AD Configuration is complex. Please carefully review the instructions to configure your system.

  1. Create a User within the calendar database that has administrator privileges. The name of the User should be the lower case name of the User that exists within the directory.
  2. Add a line to the cdaily-5.0.0/WEB-INF/configuration.properties that specifies the LDAP/AD authentication provider:

    AuthenticationProvider=com.mhsoftware.cdaily.support.security.AuthProviderLDAP
  3. Active Directory Users should follow the steps in SSL LDAP Setup on Windows section in Configuring Active Directory Authentication.
  4. UNIX Users should get the SSL certificate used by the LDAP server and put it in a local keystore file. On Linux the steps were:

    openssl x509 -inform pem -in /usr/share/ssl/certs/slapd.pem \
    -outform der -out ~/slapd.der

    keytool -import -file ~/slapd.der -keystore \
    ~/sslkey.keystore -alias "type=r.name=sslkey"
  5. Edit the ldap.properties file located in the cdaily-5.0.0/WEB-INF directory. Refer to the help topic ldap.properties Reference Guide.
  6. It is strongly recommended that you configure connectDaily to use SSL communications between the browser and the web server running connectDaily. Failure to do so may result in compromise of your network security.
  7. If you want connectDaily to synchronize its group memberships with your LDAP source, edit each connectDaily user group and set the LDAP equivalent groups.

Once you have all the steps completed and verified the LDAP authentication is working properly, stop the connectDaily service and restart it.

If it doesn't work, refer to the topic for Debugging LDAP/AD Authentication.

If desired, you can customize the included source file for this provider and override how it works. If you do this, you will need to change the class name and deploy the compiled file into the cdaily-5.0.0/WEB-INF/classes sub-directory. Set the AuthenticationProvider entry in the configuration.properties file to point to your new class name.

See Also: Automatically Creating Users

See Also

LDAP/Active Directory Authentication

Configuring Active Directory Authentication

ldap.properties Reference Guide

Debugging LDAP/AD Authentication