Documentation for Crowd 2.4. Documentation for other versions of Crowd is available too.
Crowd provides built-in connectors for the most popular LDAP directory servers, including Microsoft Active Directory, Sun DSEE, OpenLDAP, Apache DS, and others.
On this page:
To configure an LDAP directory connector,
Screenshot 1: Directory details
属性 |
説明 |
---|---|
名前 |
The name used to identify the directory within Crowd. This is useful when there are multiple directories configured, e.g. 'Chicago Employees' or 'Web Customers'. |
説明 |
Details about this specific directory. |
Cache Enabled |
We recommend that you turn on LDAP caching. For more information, see Configuring Caching for an LDAP Directory. |
アクティブ |
Only deselect this if you wish to prevent all users within the directory from accessing all mapped applications. If a directory is not marked as 'Active', it is inactive. Inactive directories:
|
Screenshot 2: Connector details
属性 |
説明 |
---|---|
Connector |
The directory connector to use when communicating with the directory server. |
URL |
The connection URL to use when connecting to the directory server. The URL for Microsoft Active Directory should be in the following format: |
Secure SSL |
Specifies whether the connection to the directory server is an SSL connection. Please ensure that you have followed the instructions to configure an SSL Certificate before enabling this setting. |
Use Node Referrals |
Use the JNDI lookup java.naming.referral option. Generally needed for Active Directory servers configured without proper DNS, to prevent a 'javax.naming.PartialResultException: Unprocessed Continuation Reference(s)' error. |
Use Nested Groups |
Enable or disable support for nested groups on the LDAP user directory. |
Use the User Membership Attribute |
Put a tick in the checkbox if your Active Directory supports the group membership attribute on the user. (By default, this is the 'memberOf' attribute.)
|
Use 'memberOf' for Group Membership |
Put a tick in the checkbox if your Active Directory supports the 'memberOf' attribute on the user.
|
ページングされた結果を使用 |
Use the LDAP control extension for simple paging of search results. Retrieves chunks of data rather than all of the search results at once. This feature may be necessary when using Microsoft Active Directory if more than 999 results are returned for any given search. |
Paged Results Size |
Enter the desired page size i.e. the maximum number of search results to be returned per page, when paged results are enabled. Defaults to 999 results. |
Use Naive DN Matching |
This setting determines how Crowd will compare DNs to determine if they are equal. See Using Naive DN Matching.
|
Enable Incremental Sync |
Crowd supports retrieving only changes made after last synchronisation when connecting to Active Directory.
|
Polling Interval |
Crowd will send a request to Active Directory every x minutes, where 'x' is the number specified here. Please read the full instructions: Configuring Caching for an LDAP Directory. |
Read Timeout |
The time, in seconds, to wait for a response to be received. If there is no response within the specified time period, the read attempt will be aborted. A value of 0 (zero) means there is no limit. |
Search Timeout |
The time, in seconds, to wait for a response from a search operation. A value of 0 (zero) means there is no limit. |
コネクション タイムアウト |
The time, in seconds, to wait when opening new server connections. If not specified, the TCP network timeout will be used, which may be several minutes. |
ベース DN |
Enter the root distinguished name to use when running queries versus the directory server. Examples: |
ユーザー DN |
Distinguished name of the user that Crowd will use when connecting to the directory server. For example: |
パスワード |
上記で指定したユーザーのパスワード。 |
Note: You can also configure site-wide LDAP connection pool settings. See Configuring the LDAP Connection Pool.
We have shown the settings for Active Directory. For details about the settings for your specific directory server, please see:
Once you have selected a connector you can modify various LDAP object and attribute settings of the specific LDAP server for users and groups as shown on the screenshots below. On first setup, Crowd will provide generic default settings based on the connector selected.
When configuring your LDAP connector, if you are using non-standard object types, you will need to adjust the default filter and object type configurations. If your connector is added successfully, but you are unable to see any data when browsing your LDAP directory, it is likely that your object and filters are configured incorrectly.
Screenshot 3: User configuration
属性 |
説明 |
---|---|
ユーザー DN |
This value is used in addition to the base DN (distinguished name) when searching and loading users. An example is |
ユーザー オブジェクト クラス |
This is the name of the class used for the LDAP user object. An example is |
ユーザー オブジェクト フィルタ |
The filter to use when searching user objects. |
ユーザー名属性 |
The attribute field to use when loading the username. Examples are |
ユーザー名 RDN 属性 |
The RDN (relative distinguished name) to use when loading the username. An example is |
ユーザの名属性 |
The attribute field to use when loading the user's first name. An example is |
ユーザーの姓属性 |
The attribute field to use when loading the user's last name. An example is |
ユーザーの表示名属性 |
The attribute field to use when loading the user's full name. An example is |
ユーザーのメール属性 |
The attribute field to use when loading the user's email address. An example is |
User Group Attribute |
The attribute field to use when loading the user's groups. An example is |
ユーザーのパスワード属性 |
The attribute field to use when loading a user's password. An example is |
Screenshot 4: Group configuration
属性 |
説明 |
---|---|
Group DN |
This value is used in addition to the base DN when searching and loading groups, an example is ou=Groups. If no value is supplied, the subtree search will start from the base DN. |
グループ オブジェクト クラス |
This is the name of the class used for the LDAP group object. Examples are |
グループ オブジェクト フィルター |
The filter to use when searching group objects. An example is |
グループ名属性 |
The attribute field to use when loading the group's name. An example is |
グループ説明属性 |
The attribute field to use when loading the group's description. An example is |
グループ メンバー 属性 |
The attribute field to use when loading the group's members. An example is |
Screenshot 5: Role configuration
属性 |
説明 |
---|---|
Disable Roles |
When you create an LDAP directory connector, roles in Crowd will be disabled by default. To enable roles, remove the tick from the checkbox. You may need to click out of the checkbox (e.g. click the 'Update' button) to see the role configuration fields. Then click the 'Update' button again to apply the change. As previously announced, roles are now deprecated in Crowd. We have not changed the functionality of roles in Crowd 2.1, but we do recommend that you move away from the use of roles in your Crowd installation so that you will not be adversely affected by the planned redesign of role functionality. Roles are disabled by default when you create a new LDAP directory. We recommend that you leave roles disabled, unless you have existing data that includes roles.
At present, the implementation of roles in Crowd is identical to the implementation of groups. This design does not provide much useful functionality, so we are planning to redesign the way Crowd supports roles. If you would like to help us to design better role-based access control, please add a comment to the improvement request CWD-931, letting us know how you would like to see it work. |
Role DN |
This value is used in addition to the base DN when searching and loading roles. An example is |
Role Object Class |
This is the name of the class used for the LDAP role object. An example is |
Role Object Filter |
The filter to use when searching role objects. An example is |
Role Name Attribute |
The attribute field to use when loading the role's name. An example is |
Role Description Attribute |
The attribute field to use when loading the role's description. An example is |
Role Members Attribute |
The attribute field to use when loading the role's members. An example is |
The Crowd LDAP connectors assume that all container objects (groups and roles) have the full DN to the associated member. Currently, the membership attributes on a User object are not used by Crowd; however, in the future these associations may be used to assist with performance when looking up memberships.
Zimbra Mail Server
User objects have been tested and are known to work with the zimbraAccount
LDAP object types.
Microsoft Active Directory
The Active Directory LDAP connector assumes that all LDAP object types are of the default structure. Any changes to the default object structure of the User
and Group
objects will require a custom connector to be coded.
Crowd's LDAP connectors support the adding and updating of the following user attributes when integrating with an LDAP server via an LDAP directory connector:
If you need support for additional LDAP attributes, the Crowd LDAP connector can be extended. With a license purchase, full source is available and the LDAP connectors can be modified to support any number of attributes.
To help you identify your LDAP structure, you may find an LDAP browser useful. Take a look at our guide on using Apache Directory Studio.
Crowd supports the following LDAP directories:
Specify the directory permissions, which allow you to restrict the way in which applications can use the directories. See Specifying Directory Permissions.
Once you have configured the directory's permissions, you have finished configuring your new directory. You can then map the directory to appropriate applications.
Using Apache Directory Studio for LDAP Configuration
Crowd Documentation