Configure LDAP authentication
This page describes StackState version 4.1.
The StackState 4.1 version range is End of Life (EOL) and no longer supported. We encourage customers still running the 4.1 version range to upgrade to a more recent release.
StackState is built to work with one of two authentication configurations: a file-based authentication, and LDAP. This document explains how to configure LDAP authentication.
Prepare the config file for LDAP authentication
LDAP configuration uses the etc/application_stackstate.conf
file located in the StackState installation directory. Check out this page -Configure authentication - for more information about authentication
block of this file. Out of the box the configuration file is prepared to support file-based authentication, the following changes are required to enable LDAP authentication:
1. Enable authentication
At the beginning of the authentication
block of application_stackstate.conf
file locate following lines:
To enable authentication, change this line to:
2. Set the authentication server type
As mentioned above, out of the box StackState configuration is set to a file-based authentication. To use LDAP configuration, locate the authServerType
block in authentication
:
Now change stackstateAuthServer
to ldapAuthServer
and remove the configuration for the built-in user store configuration. Your configuration file should look like this now:
3. Provide the connection details and bind credentials to LDAP server
Now you need to include LDAP connection information, such as the host address, the port number that LDAP is available at, and optional bind credentials, as below:
Your configuration file should have authentication
block similar to this:
4. Set the base directory where the user records are stored
In this step, you need to provide information about the hierarchical structure of entries (Directory Information Tree) used by LDAP. Follow the example below:
Please note that subjects (users or roles) created in StackState are stored in StackGraph, and to ensure they work with your LDAP configuration, subjects created in StackState must reflect the ones from your LDAP. With bindCredentials
and userQuery
configured, a username provided during login to StackState is checked against entries inside provided LDAP directories and their children directories.
5. Set the base directory where the group membership records are stored
Similarly, as for users, you need to provide information about the group directories used by LDAP:
LDAP groups are reflecting Roles in StackState - the Group name in LDAP must be the same as the Role subject name in StackState.
6. Summary
After completion of all above steps your StackState configuration is ready to be used with LDAP in your organization. You can start creating Subjects, and setting up Roles. Find out more on pages describing Scopes, and Permissions.
Last updated