Configuring LDAP/Active Directory Logon

You can configure erwin Data Intelligence Suite (DI Suite) to use LDAP or Active Directory logon using the database.properties file. Ensure that the following prerequisites are in place:

  • Create an organizational unit (OU) in Active Directory and create roles corresponding to the ones available in erwin DI Suite, except Administrator. Ensure that the role names in Active Directory match the role names in erwin DI Suite.
    For example, create an organizational unit, AMMRoles in Active Directory. Then, under AMMRoles, create all the roles (ETLDeveloper, Mapping Admin, Power User, Tester, and so on) available in erwin DI Suite.
  • For the Administrator role, create a group in Active Directory. The name of the group cannot be Administrator as a Global Group named Administrator is already available in Active Directory.
    For example, create an administrator role, AMMAdministrator, in Active Directory.

Following is a sample snippet of LDAP properties:

#Start LDAP Properties #uid,sAMAccount,cn
IsLDAPEnabled=false
LDAPLoginAttribute=sAMAccountName
LDAPServerUrl=ldap://<ldapserver/ipaddress>:389/DC=ERWIN,DC=LOCAL
LDAPUserDN=CN=ammuser,OU=AMMEmployees,DC=ERWIN,DC=LOCAL
LDAPServerPassword=<ldappwd>
LDAPSearchBase=DC=ERWIN,DC=LOCAL
LDAPBindUser=ammuser
LDAPBindServerURL=ldap://<ldapserver/ip>:389
SearchBase=
SearchFilter=(sAMAccountName={0})
GroupRoleAttribute=cn
ConstructorArg=OU=AMMRoles
LDAPAdminGroupName=AMMAdministrator
## END LDAP Properties

The following table lists LDAP configuration parameters:

Parameter

Description-Value

IsLDAPEnabled

Set to True.

LDAPLoginAttribute

Set the login attribute name used to bind to the LDAP database. It can be any of the #uid, sAMAccountName, or cn, as set up.

For example, LDAPLoginAttribute=sAMAccountName.

LDAPServerUrl

Set a fully-qualified name (URL) of the LDAP Server IP address, port number, and domain controller.

For example, LDAPServerUrl=ldap://192.168.1.10:389/DC=ERWIN,DC=LOCAL

LDAPUserDN

Set the LDAP bind user with fully-qualified distinguished name. You can add any user DN with the privilege to search LDAP/Active Directory.

For example, in the following case, ammuser is the bind user:

LDAPUserDN=CN=ammuser,OU=AMMEmployees,DC=ERWIN,DC=LOCAL.

LDAPServerPassword

Set the password associated with the LDAP Server.

LDAPSearchBase

Set a fully qualified search base. A search base to set limits on the authentication server directories.

The standard format is, DC=<first part of distinguished server name>, DC=<any part of the distinguished server name that appears after the dot>.

For example, LDAPSearchBase=DC=ERWIN,DC=LOCAL.

LDAPBindUser

Set the bind user name.

For example, LDAPBindUser=ammuser.

LDAPBindServerUrl

Set the LDAP Bind Server URL.

For example, LDAPBindServerURL=ldap://192.168.1.10:389

SearchBase

Set an OU to put limits on the authentication server directories. It is an optional paramater.

For example, SearchBase=OU=AMMEmployees

SearchFilter

Set the login attribute type used to get user information.

For example, SearchFilter=(sAMAccountName={0})

GroupRoleAttribute

Set the group role attribute to holds user group information on the LDAP server. It is the identifier to search the association between the user and the AMM role.

For example, GroupRoleAttribute=cn

ConstructorArg

Set the path where AMM roles are created.

For example, ConstructorArg=OU=AMMRoles

LDAPAdminGroupName

Set the AMM administrator role name.

For example, LDAPAdminGroupName=AMMAdministrator