Active Directory & LDAP
Connect ExaVault to Active Directory or another LDAP directory to centralize authentication and directory data. Configuring the LDAP connection lets ExaVault use your LDAP server for user authentication only. If you want ExaVault to create and manage users and groups from Active Directory, also complete the AD sync settings on the same screen.
How The LDAP Screen Works
The LDAP screen configures the connection to your LDAP or Active Directory server.
That same connection can serve two jobs.
LDAP authentication validates a user’s password against your directory at sign-in time. You still create and manage those users in ExaVault.
Active Directory sync uses the LDAP connection to import users and groups from Active Directory. Active Directory becomes the source of truth for synced users and groups.
If you only need centralized password validation, configure LDAP Authentication and stop there.
If you also need automatic user and group provisioning, configure Active Directory Sync, which requires more information.
How LDAP Authentication Works
LDAP Authentication occurs when an ExaVault user configured for Active Directory & LDAP attempts to log in.
ExaVault authenticates by binding to your LDAP server with the username the user enters and the password they provide.
ExaVault only attempts LDAP authentication for users that already exist in ExaVault and are configured to use LDAP authentication. If the user does not exist locally, ExaVault rejects the login attempt without contacting your LDAP server.
ExaVault supports multiple LDAP servers per site. When a user logs in who has their Authentication set to Active Directory & LDAP, ExaVault tries each configured LDAP server. When authentication fails against one server, ExaVault attempts the next server in order.
After a successful LDAP bind, ExaVault still enforces ExaVault account checks. An account that is valid in your LDAP but expired or disabled cannot log in to ExaVault.
How Active Directory Sync (AD Sync) Works
Active Directory sync adds automatic user and group provisioning to your LDAP configuration. Use this when you already need LDAP or Active Directory connectivity and you want Active Directory to control user lifecycle and group membership in ExaVault.
Active Directory sync manages user and group records. It does not validate user passwords at sign-in time.
ExaVault sync starts from the Active Directory security group that you choose. ExaVault finds that group by matching its Active Directory Common Name (CN) to the configured Group in the LDAP Server Configuration.
ExaVault imports all direct members of that group. ExaVault also imports nested groups by processing group membership recursively.
ExaVault treats Active Directory as the source of truth for synced objects.
ExaVault creates or updates groups it finds in Active Directory.
ExaVault creates or updates users it finds in Active Directory.
ExaVault disables previously synced users that do not appear in the current sync.
ExaVault deletes previously synced groups that do not appear in the current sync.
ExaVault treats synced groups as AD-managed groups. ExaVault removes non-synced users from AD-managed groups during sync.
ExaVault ignores machine accounts.
LDAP Configuration Screen
AD/LDAP Server Name
Human-readable name for your LDAP server
LDAP & AD Sync
AD/LDAP Server
Address of your LDAP server, starting with ldap:// or ldaps://
LDAP & AD Sync
Port
Port number for the server. Usually Port 389 for ldap:// or Port 636 when using TLS/SSL
LDAP & AD Sync
Security Level
What kind of encryption is used for the server. Choices are None, SSL or TLS.
LDAP & AD Sync
Group
The common name (CN) of an AD Security Group. Only users and sub-groups that are members of this group will be imported. Defaults to ExaVault.
AD Sync
Service account username
Service account
AD Sync
Service account password
Password for service account.
AD Sync
Base DN
The base DN from which all LDAP searches are performed. Example:
DC=corp,DC=example,DC=com
LDAP & AD Sync
User E-mail Field
Whether to map users by UPN or Email.
AD Sync
Certificate Name
Filename of a client certificate placed in /etc/ssl/.
LDAP & AD Sync
Username Prefix & Username Suffix
The Username Prefix and Username Suffix fields are used to format the bind username when querying the LDAP server during authentication.
ExaVault concatenates them in the order Username Prefix + Username + Username Suffix to form the bind username used for the LDAP query.
ExaVault supports 3 different styles of bind username formats you can choose from:
NetBIOS domain format: set Username Prefix to
DOMAIN\and leave Username Suffix empty.UPN format: leave Username Prefix empty and set Username Suffix to
@your-domain.Distinguished name format: set Username Prefix and Username Suffix so the result is a full DN. example: set Username Prefix to
uid=and Username Suffix to,ou=people,dc=example,dc=orgto get the full DN.
Configuring LDAP Servers
To configure LDAP authentication, you will need:
Server Details: Address, port number, and encryption method (None, SSL, or TLS).
User Mapping: Whether to use the Local Email or UserID as the UPN.
Binding Strings: The specific Prefix and Suffix strings used to format the UPN for your directory.
Add the information on the LDAP screen under Admin Settings. Complete the fields listed as "LDAP & AD Sync" in the Configuration table.
Configuring Active Directory Sync
Active Directory sync uses the LDAP server configuration for connectivity. Complete the fields needed for LDAP authentication on the LDAP Screen in Admin Settings:
Server Details: Address, port number, and encryption method (None, SSL, or TLS).
User Mapping: Whether to use the Local Email or UserID as the UPN.
Binding Strings: The specific Prefix and Suffix strings used to format the UPN for your directory.
The sync process also requires service account info and the Active Directory group name.
Supply the Service account username used to bind to Active Directory during the sync. It also uses the Username Prefix & Username Suffix during the bind.
Set the Group name to the Common Name (CN) of the Active Directory security group that will be synced to ExaVault. Only users and sub-groups that are members of this group will be imported into ExaVault.
Configure A User To Use LDAP Authentication
To use LDAP Authentication for a user, add their user record within ExaVault, and set their Authentication to Active Directory & LDAP. Don't assign a password within ExaVault, because their credentials will be sent to the LDAP server during authentication.
Last updated