Configuring an AD/LDAP Server
The Active Directory/LDAP server is optional. However, you can use it to import CT-VL users and CT-VL GUI Administrators. See Active Directory/LDAP Server Requirements before configuring. You must configure the AD/LDAP server on every node in your CT-VL HA cluster.
Go to the
auth
command category in the CT-VL CLI to see theldap
command.Like all CLI commands, you can type the command without a parameter and a usage example is displayed:
Disable, then enable LDAP support in the Tokenization Server:
Note
If you disable LDAP support, then you can use only the CT-VL GUI to create users and groups.
Set the AD/LDAP server URI with the
--server command
(where the default port number for an LPDAS server is 636):or (where the default port number for an LDAP server is 389):
Example:
Set the binding DN of the user who has access to the AD/LDAP server with password. Example:
Example:
Set user search scope using
user_search_scope
command:Example:
Set group search scope using the
group_search_scope
command:Example:
Set attribute field for user search filter using the
user_search_filter
command:Example:
Set user prefix name using
user_prefix
command. The user prefix is the attribute that should be used to prefix the user name when searching for the user name in the LDAP database.Example:
Set the Tokenization Server active user group using the
active_user_group
command:In this example, any user who wants access to the CTS RESTful API, must belong to the AD group ctsUsers within Users of the domain cts.vormetric.com:
Set the CT-VL superuser group using the
--super_user_group
command:In this example, any user who requires access to the CTS GUI and REST APIs, must belong to the AD group ctsSuperuser within Users of domain cts.vormetric.com:
For LDAPS Support Only: Import the CA certificate chain of the LDAP server to the built-in LDAPS client of CT-VL. A Certificate Management tool like DigiCert or Certificate Manager tool is recommended to request the certificate, after which use the
--ca_cert
option to import the certificate into the CT-VL.Note
The
--ca_cert
option uses an underscore (_) instead of a hyphen (-).a. Using a Certificate Management tool like DigiCert or Certificate Manager tool, download your intermediate and root certificates.
Note
CT-VL requires all certificates to be in PEM format.
b. Run
--ca_cert
import to import the certificate trust chain. Paste the entire body of each certificate in the order shown in the example, then terminate with Ctrl-d when finished.Execute the
--show
option to list the LDAP configuration: