CloudBees Software Delivery Automation uses account information from multiple sources for authentication. In most cases, the primary account information source is an external LDAP or Active Directory repository: both user and group information is retrieved from the repository. Local users and groups are defined within CloudBees Software Delivery Automation.
To view the list of configured directory providers, available from CloudBees CD/RO:
-
From the CloudBees navigation, select CloudBees CD/RO.
-
From the CloudBees CD/RO main menu, go to
. The directory provider list displays.
Creating a new provider
-
From the CloudBees navigation, select CloudBees CD/RO.
-
From the CloudBees CD/RO main menu, navigate to
. -
Select the New button in the upper right corner.
-
Select the type of provider or Copy Existing.
Creating an Active Directory provider
Enter information in the fields as follows to specify your existing Active Directory users and groups to communicate with CloudBees Software Delivery Automation.
Details tab
Field Name | Description | ||
---|---|---|---|
Name |
This name identifies users and groups that come from this provider. |
||
Description |
Description of provider. |
||
URL Discovery |
Select the method to retrieve the URL for the Active Directory server. Auto-discovery using DNS automatically discovers Active Directory servers on the given domain. Alternatively, you can specify a custom URL to an Active Directory server. |
||
Domain Name |
The domain where Active Directory servers are automatically discovered. For example, |
||
Use SSL |
Select this box if you want to use SSL when the CloudBees Software Delivery Automation server contacts your Active Directory server.
|
||
Query User Name |
The name of a user who has read-only access to user and group directories in Active Directory. This is the user name to use for fetching user and group information. When you provide a |
||
Query User Password |
The password for the query user. |
Provider Options tab
Membership Options section The membership options control whether the nested group hierarchy in the configured Active Directory server will be used by CloudBees Software Delivery Automation. | |||
---|---|---|---|
Recursively Traverse Group Hierarchy |
Select this to enable recursive traversal of the group hierarchy for nested group membership information. If Recursively Traverse Group Hierarchy is selected, select the LDAP_MATCHING_RULE_IN_CHAIN template for both the Membership Filter and Group Member Filter fields in the "Group Options" section to allow Active Directory to return the nested group membership information. |
||
Membership Filter |
Active Directory filter to use when searching for groups to which an Active Directory user or group belongs. |
||
Include Nested Group Users in Notifications |
Select this to include users in nested Active Directory groups when notifications for a parent Active Directory group are sent and Recursively Traverse Group Hierarchy is selected. |
||
Include Nested Group Users as Approvers |
Select this to allow users in nested Active Directory groups to complete or approve a manual task when a parent Active Directory group is assigned as an assignee or an approver for the task and Recursively Traverse Group Hierarchy is selected.
|
||
User Options section When creating an Active Directory provider, the CloudBees Software Delivery Automation server automatically sets default values for any options (fields) that are empty. The default values match the most common Active Directory configurations. After the provider is created, you can view and modify defaults by modifying the provider. |
|||
User Base |
This string is prepended to the `basedn ` to construct the directory DN containing user records. |
||
User Search Filter |
This LDAP query is performed in the context of the user directory to search for a user by account name. The string |
||
User Name Attribute |
This is the attribute in a user record that contains the user’s account name. |
||
Full User Name Attribute |
(Optional) This is the attribute in a user record that contains the user’s full name (first and last) for display in the UI. If this attribute is not specified or the resulting value is empty, the user’s account name is used instead. |
||
User Email Attribute |
(Optional) This is an attribute in a user record that contains the user’s email address. If this attribute is not specified, the account name and domain name are concatenated to form an email address. |
||
Search User Subtree |
Select this check box to search the specified directory by the user base and all directories below. If this check box is not selected, the search is limited to the specified directory only. |
||
Group Options section
When creating an Active Directory provider, the CloudBees Software Delivery Automation server automatically sets default values for the options/fields that remain empty. These default values match the most common Active Directory configurations. After the provider is created, you can view and modify the defaults by modifying the provider. |
|||
Enable Groups |
Select this check box to enable external groups for this directory provider. |
||
Group Base |
(Optional) This string is prepended to the `basedn ` to construct the directory DN containing group records. |
||
Group Member Filter |
(Optional) This LDAP query is performed in the groups directory context to identify groups that contain a specific user. Two common forms of group records in LDAP directories are: |
||
Group Member Attributes |
(Optional) This is a comma-separated attribute name list that identifies a group member. Most LDAP configurations only specify a single value, but if a mixture of POSIX and LDAP style groups exist in the directory, multiple attributes might be required. |
||
Group Search Filter |
(Optional) This LDAP query is performed in the context of the groups directory to enumerate group records. You can choose from common templates that include either security or distribution groups (or both). These templates are based on the most common Active Directory settings. |
||
Unique Group Name Attribute |
(Optional) This is the group record attribute that contains the group name. To prevent group name overlap between multiple directory providers (or within the same provider in a multi-forested Active Directory server), we recommend setting this attribute to the |
||
Common Group Name Attribute |
The Unique Group Name Attribute may not be searchable if using the |
After filling in all fields, select the Test Provider Configuration tab. Three tests validate the information you supplied:
-
Test User Name
-
Test User Password
-
Query User Password
If there is a test failure, correct the information you supplied and retest. Select Save after successful test results. New, defined directory providers will appear in the table on the Directory Provider web page.
Creating an LDAP directory provider
Enter information in the fields as follows to specify your existing LDAP users and groups to communicate with CloudBees Software Delivery Automation. For examples of information you enter in the these fields, see the table after the following description sections.
Details tab
Field Name | Description | ||
---|---|---|---|
Name |
This name identifies users and groups that come from this provider. |
||
Description |
Description of the provider. |
||
URL |
The LDAP server URL is in the form protocol://host:port/basedn . Protocol is either
|
||
Realm |
This is the realm of the LDAP directory provider, which is used to create unique user names when you have multiple providers. For example, if the realm is |
||
Query User Name |
This is the name of a user who has read-only access to the user and group directories in LDAP. This is the user name to use for fetching user and group information. When providing a domain name, you can provide the simple name, for example, myuser. When providing an explicit URL, you need to provide a distinguished name, for example: |
||
Query User Password |
This is the password for the query user. |
Provider Options tab
Membership Options section The membership options control whether nested group hierarchy in the configured LDAP server will be used by CloudBees Software Delivery Automation. | |||
---|---|---|---|
Recursively Traverse Group Hierarchy |
Select this to enable recursive traversal of the group hierarchy for nested group membership information. |
||
Membership Attribute |
Attribute defined on an LDAP user or group entry that is used by the LDAP provider for specifying the group membership. |
||
Nested Groups Depth Limit |
Maximum number of group hierarchy levels that will be traversed for retrieving nested group membership information.
|
||
Include Nested Group Users in Notifications |
Select this to include users in nested LDAP groups when notifications for a parent LDAP group are sent and Recursively Traverse Group Hierarchy is selected. |
||
Include Nested Group Users as Approvers |
Select this to allow users in nested LDAP groups to complete or approve a manual task when a parent LDAP group is assigned as an assignee or an approver for the task and Recursively Traverse Group Hierarchy is selected.
|
||
User Options section |
|||
User Base |
This string is prepended to the |
||
User Search Filter |
This LDAP query is performed in the context of the user directory to search for a user by account name. The string |
||
User Name Attribute |
This is the attribute in a user record that contains the user’s account name. |
||
Full User Name Attribute |
(Optional) This is the attribute in a user record that contains the user’s full name (first and last) for display in the UI. If this attribute is not specified or the resulting value is empty, the user’s account name is used. |
||
User Email Attribute |
(Optional) This is the attribute in a user record that contains the user’s email address. If the attribute is not specified, the account name and domain name are concatenated to form an email address. |
||
Search User Subtree |
Select this check box to search the specified directory by the user base and all directories below. If this check box is not selected, the search is limited to the specified directory only. |
||
Groups Options section
|
|||
Enable Groups |
Select this checkbox to enable groups. |
||
Group Base |
(Optional) This string is prepended to the `basedn ` to construct the directory DN containing group records. |
||
Group Member Filter |
(Optional) This LDAP query is performed in the groups directory context to identify groups containing a specific user. Two common forms of group records in LDAP directories are: |
||
Group Member Attributes |
(Optional) This is a comma-separated attribute name list identifying a group member. Most LDAP configurations only specify a single value, but if you have a mixture of POSIX and LDAP style groups in the directory, multiple attributes might be required. |
||
Group Search Filter |
(Optional) This LDAP query is performed in the context of the groups directory to enumerate group records. |
||
Unique Group Name Attribute |
(Optional) This is the group record attribute containing the group name. |
||
Common Group Name Attribute |
The Unique Group Name Attribute may not be searchable if using |
After filling in all fields, select either OK or the Test Provider Configuration tab. Three tests validate the information you supplied:
-
Test User Name
-
Test User Password
-
Query User Password
If there is a test failure, correct the information you supplied and retest. Select Done after successful test results. New, defined directory providers will appear in the table on the Directory Provider web page.
Examples for directory provider field descriptions
The following table provides examples for filling in the fields described above:
Field Name | LDAP example | ActiveDirectory example |
---|---|---|
Provider Type |
|
|
Domain Name |
|
|
Realm |
|
`N/A ` |
URL |
|
|
Query User Name |
|
|
Query User Password |
|
|
User Base |
|
|
User Search Filter |
|
|
User Name Attribute |
|
|
Full User Name Attribute |
|
|
User Email Attribute |
|
|
Group Base |
|
|
Group Member Filter |
|
|
Group Member Attribute |
|
|
Group Search Filter |
|
|
Unique Group Name Attribute |
|
|
Common Group Name Attribute |
|
|
Editing an existing directory provider
You may change any previously supplied information in the fields. After editing any fields, select the Test Provider Configuration tab. The same three tests validate the information you supplied:
-
Test User Name
-
Test User Password
-
Query User Password
If there is a test failure, correct the information you supplied and retest. Select Done after successful test results. Edited, redefined directory providers appear on the Directory Provider list page.