Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Note
titleVersion Warning

The content below is for Apache Syncope <= 1.2 - for later versions the Reference Guide is available.

Table of Contents
styledecimal

Introduction

This wiki page shows all the steps needed to configure an external Active Directory resource identified by the following connection parameters:

Panel

*Server hostname: 192.168.0.129
* Server port: 636
* Principal: cn=Administrator,cn=Users,dc=pluto,dc=org
* Principal password: password
* Root suffixes: dc=pluto,dc=org
* Entry base context: cn=Users,dc=pluto,dc=org

In order to link an external Active Directory resource there are pre-requisites and configuration steps to be satisfied.

Pre-Requisites

  1. Install ConnId Active Directory JNDI connector bundle

Configuration steps

  1. Configure Active Directory JNDI connector instance
  2. Configure Active Directory resource

Configure Active Directory JNDI connector instance

Please, take a look at all configurable parameters at Active Directory Connector Configuration and use this page as reference to provide your configuration.

  1. Open your browser and access to the Syncope administration console (http://host:port/syncope-consoleImage Removed).
  2. Log into the interface by providing the following credentials:
      :
      1. Login: admin
      !ad2.png|thumbnail,width=200px!;
      :
      1. Password: password.
    1. Click on the Resources tab. Image Removed
    2. Click on the Connectors sub-tab.
    3. Click on Create new Connector button (configuration modal page appears).
    4. Click on tab General.
        :
        1. Provide Display name (e.g. 'Active Directory demo connector') and the correct Bundle name (org.connid.bundles.ad.${version}).
          Image Added
      1. Click on tab Configurations and provide connector instance configuration.
        #: Server hostname: 192.168.0.129
        #: Server port: 636
        #: Principal: cn=Administrator,cn=Users,dc=pluto,dc=org
        #: Principal password: password
        #: Root suffixes: dc=pluto,dc=org
        #: Entry base context: cn=Users,dc=pluto,dc=org
        #: Object classes to synchronize: User
        #: Entry object classes: Top Person OrganizationalPerson UserImage Removed
        #: Retrieve deleted users: TRUE
        #: Trust all certs: TRUE
        #: Memberships: cn=Domain Guests,cn=Users,dc=pluto,dc=org
        Image Added
      2. Click on tab Capabilities.
      3. Check needed capabilities as shown at Connector instance configuration.
        Image Added
      4. Click on Save button.

      Configure Active Directory resource

      ...

      1. Click on the Resources tab.
      2. Click on the Resources sub-tab.
      3. Click on Create new Resource button (configuration modal page appears).
      4. Click on Resource Details tab.
      5. Choose from the list the correct Connector instance name.
      6. Provide the following information
          :
          1. Name: Active Directory demo
          :
          1. Connector: Active Directory demo connector
            Image Added
        1. Click on Schema Mappings tab.
        2. Click on Add button to insert attributes mapping.
        3. Provide Account Link: 'cn=' + username + ',cn=Users,dc=pluto,dc=org'
          Image Added
        4. Click on Save button.
          Image Added
        Panel
        borderColor#ccc
        bgColor#fff
        borderStyledashed
        titleSchema mappingborderStyledashed

        Internal mapping types

        Internal mapping

        External Attributes

        Mandatory condition

        Account Id

        Password

        Username

         

         

        true

        X

         

        Password

         

         

        true

         

        X

        UserSchema

        surname

        sn

        true

         

         

        UserSchema

        firstname

        givenName

        false

         

         

        UserSchema

        fullname

        displayName

        false

         

         

        UserSchema

        email

        mail

        true

         

         

        ...