Creating a new Active Directory provider
Enter information in the fields as follows to specify your existing Active Directory users and groups to communicate with CloudBees CD/RO. For examples of information you enter in the these fields, see the table after the following description sections.
Field Name | Description | ||
---|---|---|---|
Provider Name |
This name identifies users and groups that come from this provider. |
||
Description |
(Optional) Plain text or HTML description for this object. If using HTML, you must surround your text with
|
||
URL Discovery |
Select the method to retrieve the URL for the Active Directory server. Auto-discovery using DNS automatically discovers Active Directory servers on the given domain. Alternatively, you can specify a custom URL to an Active Directory server. |
||
Domain Name |
The domain where Active Directory servers are automatically discovered. For example, |
||
Use SSL |
Select this box if you want to use SSL when the CloudBees CD/RO server contacts your Active Directory server.
|
||
URL |
This is an explicit URL to the Active Directory server. The URL is in the form protocol://host:port/basedn . Protocol is either
|
||
Query User Name |
The name of a user who has read-only access to user and group directories in Active Directory. This is the user name to use for fetching user and group information. When you provide a |
||
Query User Password |
The password for the query user. |
||
Membership Options sectionThe membership options control whether the nested group hierarchy in the configured Active Directory server will be used by CloudBees CD/RO. See LDAP Group Hierarchy for details on how the nested group hierarchy in Active Directory is used by CloudBees CD/RO. |
|||
Recursively Traverse Group Hierarchy |
Select this to enable recursive traversal of the group hierarchy for nested group membership information. If Recursively Traverse Group Hierarchy is selected, select the LDAP_MATCHING_RULE_IN_CHAIN template for both the Membership Filter and Group Member Filter fields in the "Group Options" section to allow Active Directory to return the nested group membership information. |
||
Membership Filter |
Active Directory filter to use when searching for groups to which an Active Directory user or group belongs. |
||
Include Nested Group Users in Notifications |
Select this to include users in nested Active Directory groups when notifications for a parent Active Directory group are sent and Recursively Traverse Group Hierarchy is selected. |
||
Include Nested Group Users as Approvers |
Select this to allow users in nested Active Directory groups to complete or approve a manual task when a parent Active Directory group is assigned as an assignee or an approver for the task and Recursively Traverse Group Hierarchy is selected.
|
||
User Options sectionWhen creating an Active Directory provider, the CloudBees CD/RO server automatically sets default values for any options (fields) that are empty. The default values match the most common Active Directory configurations. After the provider is created, you can view and modify defaults by modifying the provider. |
|||
User Base |
This string is prepended to the `basedn ` to construct the directory DN containing user records. |
||
User Search Filter |
This LDAP query is performed in the context of the user directory to search for a user by account name. The string |
||
User Name Attribute |
This is the attribute in a user record that contains the user’s account name. |
||
Full User Name Attribute |
(Optional) This is the attribute in a user record that contains the user’s full name (first and last) for display in the UI. If this attribute is not specified or the resulting value is empty, the user’s account name is used instead. |
||
User Email Attribute |
(Optional) This is an attribute in a user record that contains the user’s email address. If this attribute is not specified, the account name and domain name are concatenated to form an email address. |
||
Search User Subtree |
Select this check box to search the specified directory by the user base and all directories below. If this check box is not selected, the search is limited to the specified directory only. |
||
Group Options section
When creating an Active Directory provider, the CloudBees CD/RO server automatically sets default values for the options/fields that remain empty. These default values match the most common Active Directory configurations. After the provider is created, you can view and modify the defaults by modifying the provider. |
|||
Enable Groups |
Select this check box to enable external groups for this directory provider. |
||
Group Base |
(Optional) This string is prepended to the `basedn ` to construct the directory DN containing group records. |
||
Group Member Filter |
(Optional) This LDAP query is performed in the groups directory context to identify groups that contain a specific user. Two common forms of group records in LDAP directories are: |
||
Group Member Attributes |
(Optional) This is a comma-separated attribute name list that identifies a group member. Most LDAP configurations only specify a single value, but if a mixture of POSIX and LDAP style groups exist in the directory, multiple attributes might be required. |
||
Group Search Filter |
(Optional) This LDAP query is performed in the context of the groups directory to enumerate group records. You can choose from common templates that include either security or distribution groups (or both). These templates are based on the most common Active Directory settings. |
||
Unique Group Name Attribute |
(Optional) This is the group record attribute that contains the group name. To prevent group name overlap between multiple directory providers (or within the same provider in a multi-forested Active Directory server), we recommend setting this attribute to the |
||
Common Group Name Attribute |
The Unique Group Name Attribute may not be searchable if using the |
After filling in all fields, click the Test button. Three tests validate the information you supplied:
-
user authentication
-
user identified in Active Directory
-
find all groups where the user is a member
If there is a test failure, correct the information you supplied and retest. Click Save after successful test results. New, defined directory providers will appear in the table on the Directory Provider web page.
To create a new LDAP directory provider
Enter information in the fields as follows to specify your existing LDAP users and groups to communicate with CloudBees CD/RO. For examples of information you enter in the these fields, see the table after the following description sections.
Field Name | Description | ||
---|---|---|---|
Provider Name |
This name identifies users and groups that come from this provider. |
||
Description |
(Optional) Plain text or HTML description for this object. If using HTML, you must surround your text with
|
||
URL |
The LDAP server URL is in the form protocol://host:port/basedn . Protocol is either
|
||
Realm |
This is the realm of the LDAP directory provider, which is used to create unique user names when you have multiple providers. For example, if the realm is |
||
Query User Name |
This is the name of a user who has read-only access to the user and group directories in LDAP. This is the user name to use for fetching user and group information. When providing a domain name, you can provide the simple name, for example, myuser. When providing an explicit URL, you need to provide a distinguished name, for example: |
||
Query User Password |
This is the password for the query user. |
||
Membership Options sectionThe membership options control whether nested group hierarchy in the configured LDAP server will be used by CloudBees CD/RO. See xLDAP Group Hierarchy for details on how the nested group hierarchy in the LDAP server is used by CloudBees CD/RO. |
|||
Recursively Traverse Group Hierarchy |
Select this to enable recursive traversal of the group hierarchy for nested group membership information. |
||
Membership Attribute |
Attribute defined on an LDAP user or group entry that is used by the LDAP provider for specifying the group membership. |
||
Nested Groups Depth Limit |
Maximum number of group hierarchy levels that will be traversed for retrieving nested group membership information.
|
||
Include Nested Group Users in Notifications |
Select this to include users in nested LDAP groups when notifications for a parent LDAP group are sent and Recursively Traverse Group Hierarchy is selected. |
||
Include Nested Group Users as Approvers |
Select this to allow users in nested LDAP groups to complete or approve a manual task when a parent LDAP group is assigned as an assignee or an approver for the task and Recursively Traverse Group Hierarchy is selected.
|
||
User Base |
This string is prepended to the |
||
User Search Filter |
This LDAP query is performed in the context of the user directory to search for a user by account name. The string |
||
User Name Attribute |
This is the attribute in a user record that contains the user’s account name. |
||
Full User Name Attribute |
(Optional) This is the attribute in a user record that contains the user’s full name (first and last) for display in the UI. If this attribute is not specified or the resulting value is empty, the user’s account name is used. |
||
User Email Attribute |
(Optional) This is the attribute in a user record that contains the user’s email address. If the attribute is not specified, the account name and domain name are concatenated to form an email address. |
||
Search User Subtree |
Select this check box to search the specified directory by the user base and all directories below. If this check box is not selected, the search is limited to the specified directory only. |
||
Enable Groups |
Select this checkbox to enable groups. |
||
Group Base |
(Optional) This string is prepended to the `basedn ` to construct the directory DN containing group records. |
||
Group Member Filter |
(Optional) This LDAP query is performed in the groups directory context to identify groups containing a specific user. Two common forms of group records in LDAP directories are: |
||
Group Member Attributes |
(Optional) This is a comma-separated attribute name list identifying a group member. Most LDAP configurations only specify a single value, but if you have a mixture of POSIX and LDAP style groups in the directory, multiple attributes might be required. |
||
Group Search Filter |
(Optional) This LDAP query is performed in the context of the groups directory to enumerate group records. |
||
Unique Group Name Attribute |
(Optional) This is the group record attribute containing the group name. |
||
Common Group Name Attribute |
The Unique Group Name Attribute may not be searchable if using |
After fillingin all fields, click the Test button. Three tests validate the information you supplied:
-
user authentication
-
user identified in LDAP
-
find all groups where the user is a member
If there is a test failure, correct the information you supplied and retest. Click Save after successful test results. New, defined directory providers will appear in the table on the Directory Provider web page.
Examples for directory provider field descriptions
The following table provides examples for filling in the fields described above:
Field Name | LDAP example | ActiveDirectory example |
---|---|---|
Provider Type |
|
`ActiveDirectory ` |
Domain Name |
|
|
Realm |
|
`N/A ` |
URL |
`ldap://dir.example.com/dc=company,dc=com ` |
`ldaps://server/dc=company,dc=com ` |
Query User Name |
`uid=JohnDoe,ou=People,dc=company,dc=com ` |
`cn=myuser,cn=Users,dc=company,dc=com ` |
Query User Password |
|
|
User Base |
|
|
User Search Filter |
`uid={0} ` |
|
User Name Attribute |
`uid ` |
|
Full User Name Attribute |
|
`name ` |
User Email Attribute |
|
`mail ` |
Group Base |
|
|
Group Member Filter |
`(|(member={0})(memberUid={1})) ` |
`member={0} ` |
Group Member Attribute |
`member,memberUid ` |
`member ` |
Group Search Filter |
|
`(objectClass=group) ` |
Unique Group Name Attribute |
|
`distinguishedName ` |
Common Group Name Attribute |
|
|
To edit an existing directory provider
You may change any previously supplied information in the fields. After editing any fields, click the Test button. The same three tests validate the information you supplied:
-
user authentication
-
user identified in the directory provider
-
find all groups where the user is a member
If there is a test failure, correct the information you supplied and retest. Click Save after successful test results. Edited, redefined directory providers will appear in the table on the Directory Provider web page.