NetBackup IT Analytics Security and Encryption Reference
- NetBackup IT Analytics Components and Security Compliance
- User Identity and Access Management
- Data Security and Encryption
- Appendix A. FAQs
AD/LDAP Configuration
NetBackup IT Analytics supports user authentication and optionally supports authorization using Active Directory (AD) or Lightweight Directory Access Protocol (LDAP).
Configuration of AD/LDAP authentication and authorization is driven through the configuration parameters in portal.properties
file.
AD/LDAP configuration supports following properties and can be set in the in portal.properties
file.
OS specific portal.properties
file location:
Linux:
/opt/aptare/portalconf/portal.properties
Windows:
C:\opt\aptare\portalconf\portal.properties
Table: AD/LDAP Configuration Properties
Property | Description |
---|---|
ldap.enabled | To enable LDAP, set this property to true. Supported Values: true | false |
ldap.searchBase |
Example: dc=example,dc=company,dc=com |
ldap.url |
Example : ldap://example.company.com:389 OR ldaps://example.company.com:636 |
ldap.dn |
Example: ldap.dn =CN=Admin,CN=Users,DC=example, DC=company,DC=com |
ldap.password | Set to the password of the user who is used in ldap.dn property. It will get empty and encrypted value will be set in |
ldap.password.encrypted | It is set when you restart the Portal Tomcat service after configuring LDAP. It has encrypted value of the |
ldap.loginAttribute | The login attribute used for authentication. This is the attribute name in Active Directory that specifies the username, such as uid or sAMAccountName. Example: ldap.loginAttribute=sAMAccountName |
ldap.authorization | If set to true, Portal authorizes the user against AD groups. At least one AD group of which the new user is member must be configured as a User Group in the Portal. Note: If the AD group is not mapped with the User Group in the Portal, then authentication fails during login with the error: "No user group mapping present for external LDAP user." Supported Values: true | false |
ldap.newUserDomain | Portal domain name where new user gets created. It is only used if To find domain name in portal, navigate to > >Example: ldap.newUserDomain=example.company.com |
ldap.keystore | If SSL support is enabled for LDAP, then it must have:
Note: If SSL is not enabled for LDAP, then this must be commented out. |
ldap.keystore.password | Password for the keystore which is set in Note: If SSL is not enabled for LDAP, then this must be commented out. |
ldap.keystore.password.encrypted | It is set when you restart the Portal Tomcat service after configuring LDAP. It has encrypted value of the Note: If SSL is not enabled for LDAP, then this must be commented out. |
ldap.disable.user.attribute.name (Available from 11.0) | Its value is the AD attribute that indicates whether the user is active or inactive. During Portal authentication via AD, the REST API uses the AD attribute assigned to this property to check whether the user is still an active AD user. For example, if |
ldap.disable.user.attribute.value (Available from 11.0) | Its value must be same as that value of the AD attribute (specified in For example: If
REST API matches this value with the value of the AD attribute specified in Note: A Portal super user must explicitly activate the user that was deactivated in both AD and Portal in the past but is again activated only in AD. A Portal administrator with adequate privilages can also activate such a user. Without user activation, Portal access will be restricted. |
To configure AD/LDAP for user authentication as well as authorization, Portal Administrator must create at least one User Group in portal which is also present in AD/LDAP as a UserGroup.
If you are using a self-signed certificate or an AD certificate from a non-standard certificate authority (CA), you need a keystore having the AD certificate and update the LDAP configuration in the portal.properties
file. You can skip this if you are using a standard certificate from a CA.