Using LDAP with the Delphix Engine requires the following:
- configure the Delphix Engine to use LDAP
- add LDAP users in the Delphix Management application
Configuring LDAP on the Delphix Engine
1. From the Delphix Setup application configure LDAP server with the Delphix Engine by selecting Modify in the Authentication section.
2. Enter the information about the LDAP Authentication Server.
Test Connect will issue an anonymous login request to the LDAP server. If the LDAP server has disabled anonymous access the test will fail. Test the server by adding a valid LDAP user and try logging in.
3. After updating the information and clicking the Save button, the Authentication Service section should reflect the proper information.
Create a new LDAP User account
- Login to the Delphix Management application and go to Manage > Users to add a new user.
- In the Users screen, click the Add User icon (
- Fill out the data fields and decide if the user will be a Delphix Admin. For more info on the Delphix Admin setting please see Managing System Administrators. When adding the principal, it is mandatory to specify the entire DN of the user to be added.
Example of LDAP Tree in which the base is:
and people are stored in a People subtree with RDN:
and each individual is keyed by the cn (common name) attribute.
An example DN in this case would be: cn=Tony,ou=people,dc=example,dc=com
When adding an LDAP user you will be asked for the following information:
- Principal - which is the DN from above
- email address
- username - used to login into Delphix
A password is no longer required because it will authenticate against the password already stored in the LDAP entry, which is presumably known to the individual already. It is probably best if someone familiar with the LDAP tree and using it for authentication were involved at least initially to help understand how to describe the fully qualified DN for users.
Using Microsoft AD as an LDAP server
Using Microsoft AD as a modified LDAP server is also possible. Microsoft AD allows some shortcuts in the specification of the DN when binding.
- <domain>\<user logon name>
- <user logon name>@<domain>.com
As with generic LDAP, it is probably best if someone familiar with using the AD LDAP instance for authentication was involved.