Introduction
This document describes the process to configure LDAP authentication in an Intersight Private Virtual Appliance (PVA).
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
- Lightweight Directory Access Protocol (LDAP) protocol.
- Intersight Private Virtual Appliance.
- Domain Name Server (DNS) Server.
Components Used
- Intersight Private Virtual Appliance.
- Microsoft Active Directory.
- DNS Server.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Background Information
LDAP is a protocol used to access resources from a directory over the network. These directories store information about users, organizations, and resources. LDAP provides a standard way to access and manage that information that can be used for authentication and authorization processes.
This document shows the configuration process to add remote authentication through LDAP to an Intersight PVA.
Configure
Configuration of LDAP Basic Settings
- Navigate to System > Settings > AUTHENTICATION > LDAP/AD.
- Click Configure LDAP.
- Enter the required information. Consider the next recommendations:
- The Name is set arbitrarily and does not affect the configuration.
- For the BaseDN and BindDN, copy and paste the corresponding values from your Active Directory (AD) configuration.
- The default value for Group Attribute is member.
Note: In other UCS management tools like UCSM or CIMC, Group attribute is set to memberOf. In Intersight it is recommended to leave it as member.
- Enter the password for this LDAP provider.
- Enable Nested Group Search toggle if you want to allow a recursive search in your AD for all the groups from root and their contained groups.
- Leave Enable Encryption disabled for a regular LDAP configuration. If secure LDAP is needed, enable it and ensure to review the section Configuration of LDAPS (Secure LDAP) for the complementary steps you need to configure.
- Add the configuration for one LDAP server:
- In Server introduce the IP or hostname of the LDAP server.
Caution: If hostname is used, ensure the DNS is able to map that hostname correctly.
- The default and recommended port for LDAP is 389 .
- Click Save.
Configuration Example for Basic LDAP Settings
- Monitor the workflow DeployApplianceLDAP from the Requests in the top bar.
Deployment Request
Configure Users and Groups
Once the workflow DeployApplianceLDAP is completed, you can configure either Groups or individual Users.
If you decide to use Groups, the authorization is provided to all the users that belong to that Group. If you use individual Users, then you need to add each user with its own authorization role.
Configure Groups
- Navigate to System > Settings > ACCESS & PERMISSION > Groups.
- Click Add Group.
- Select the Identity Provider. It is the name you set on the section Configure LDAP Basic Settings.
- Set a name for the group.
- Enter the value for Group Name in Identity Provider. It needs to match the configurations of the Group in your LDAP server.
- Select the Role depending on the level of access that you want to provide to the users in this group. See Roles and Privileges in Intersight.
Configuration Example for a Group
Configure Users
If you prefer to configure individual users instead of Groups, please adhere to these instructions:
- Navigate to System > Settings > ACCESS & PERMISSION > Users.
- Click Add User.
- Select Remote User.
- Select the Identity Provider. It is the name you set on the section Configure LDAP Basic Settings.
- Set a User ID.
Tip: To use the username as login method, copy in the User ID field, the value configured as sAMAccountName in your LDAP server.
If you want to use the email, ensure that you set the email of the user in the mail attribute in the LDAP server.
- Select the Role depending on the level of access that you want to provide to the user. See Roles and Privileges in Intersight.
Configuration Example for a User
Configuration of LDAPS (Secure LDAP)
If you want your LDAP communication to be secured with encryption, you need to have a certificate signed by your CA. Ensure to apply these changes to the configuration:
- Complete the steps from Configuration of LDAP Basic Settings but ensure to move the slider Enable Encryption to the right (Step 3.g).
- Ensure that the port used is either 636 or 3269 which are the ports that support LDAPS (secure). All other ports support LDAP over TLS.
Configuration Changes for Secure LDAP
- Save the configuration and wait for the workflow DeployApplianceLDAP to finish.
- Add a certificate with the next steps:
- Navigate to System > Settings > AUTHENTICATION > Certificates > Trusted.
- Click Add Certificate.
- Click Browse and select a .pem file that contains the certificate issued by your CA.
Configuration to Add a Certificate
Verify
In your browser, navigate to your Intersight Virtual Appliance URL. The screen now displays an option to login with LDAP credentials:
LDAP Configuraton Enabled from Login Screen
Troubleshoot
If the login fails, the error messages provide hints on what could be wrong.
Error 1. Wrong Access Details
Error Message for Wrong Password Error
This error means the access data is incorrect.
- Verify the username and password are correct.
Error 2. Wrong Bind Data
Error Message for Wrong Bind Data
This error means the bind data is incorrect.
- Verify the BindDN.
- Verify the bind password configured in the LDAP settings.
Error 3. Unable to Find User
Error Message for User not Found
This is triggered when the search in the LDAP server does not return any authorized users. Verify the next settings are correct:
- Check BaseDN. The parameters used to look for the user are wrong.
- Ensure the Group Attribute is set to member instead of memberOf.
- Verify the Group Name in Identity Provider in the Groups configuration is correct. This applies only when authorization is provided via Groups.
- Verify the email of the user is set properly in the mail field in the AD configuration for the user. This applies only when authorization is provided to individual Users.
Error 4. Wrong Certificate
Error Message for Wrong Certificate
If encrypted LDAP is enabled:
- Verify the certificate is configured and it includes the correct complete certificate.
Error 5. Enable Encryption is Used with a Secure Port
Error Message for Enable Encryption is Disabled
This error appears when Enable Encryption is not enabled but a port for secure LDAP is configured.
- Ensure that you use port 389 if encryption is not enabled.
Error 6. Connection Parameters Wrong
Error Message for Wrong Port
This error means that it was not possible to establish a successful connection to the LDAP server. Please verify:
- The DNS server rmust resolve the hostname of the LDAP server to the correct IP.
- Intersight appliance is able to reach the LDAP server.
- Ensure port 389 is used for unencrypted LDAP, 636 or 3269 for secure LDAP (LDAPS) and any other for TLS (enable encryption and set up a certificate).
Related Information