Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How does JON integrate with external LDAP user repositories?

0
Posted

How does JON integrate with external LDAP user repositories?

0

JON uses passwords to authenticate users. Authentication information, comprising user names and passwords, can be stored in an internal database (the default) or in an external LDAP repository. It is important to note that support for LDAP currently does not include storing attributes other than user names and passwords. In particular, authorization information such as roles used to control access to JON resources is persisted in the internal database. • Configuring JON to use LDAP for authentication • In order to configure JON to use LDAP for authentication, navigate to the Server Configuration page (Dashboard->Administration->Server Configuration). The following configuration parameters can be specified: • URL of the LDAP server: This defaults to ldap://localhost on port 389 (or port 636 if the SSL option is selected). • Username/Password: The username and password to connect to the LDAP server. The username is typically the full LDAP distinguished name (DN) of a manager user, e.g. “

0

JON uses passwords to authenticate users. Authentication information, comprising user names and passwords, can be stored in an internal database (the default) or in an external LDAP repository. It is important to note that support for LDAP currently does not include storing attributes other than user names and passwords. In particular, authorization information such as roles used to control access to JON resources is persisted in the internal database. • Configuring JON to use LDAP for authentication • In order to configure JON to use LDAP for authentication, navigate to the Server Configuration page (Dashboard->Administration->Server Configuration). The following configuration parameters can be specified: • URL of the LDAP server: This defaults to ldap://localhost on port 389 (or port 636 if the SSL option is selected). • Username/Password: The username and password to connect to the LDAP server.

0

JON uses passwords to authenticate users. Authentication information, comprising user names and passwords, can be stored in an internal database (the default) or in an external LDAP repository. It is important to note that JON support for LDAP currently does not include storing attributes other than user names and passwords. In particular, authorization information such as roles used to control access to JON resources is persisted in the internal database. • Configuring JON to use LDAP for authentication • In order to configure JON to use LDAP for authentication, navigate to the Server Configuration page (Dashboard->Administration->Server Configuration). The following configuration parameters can be specified: • URL of the LDAP server: This defaults to ldap://localhost on port 389 (or port 636 if the SSL option is selected). • Username/Password: The username and password to connect to the LDAP server. • Search Base: Base of the directory tree to search for usernames and passwords while

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.