Integrate with LDAP for user authentication
Who is this article for?
CrashPlan for Small Business, no.
Code42 for Enterprise, yes.
Link: Product plans and features.
Overview
This tutorial explains how to enable basic user authentication via LDAP for your Code42 environment. For information on advanced LDAP configuration options, see User Management With LDAP Integration.
Before you begin
- This article assumes you are familiar with basic LDAP principles.
- An on-premises master server is required for use with LDAP.
- An LDAP user account with read and search permissions is required for your master server to bind to your corporate directory service.
- The following roles include the privileges to configure LDAP settings:
- SYSADMIN role
- Server Administrator role
Considerations
- LDAP integration can cause existing Code42 CrashPlan (previously CrashPlan PROe) users to be deactivated in the following situation:
- A user account has been created in a given organization in your Code42 environment
- LDAP integration is activated for that organization
- A corresponding user account does not exist in the LDAP schema
- Your Code42 servers do not store or cache the user password from LDAP in a local database.
- Code42 CrashPlan never writes any information to LDAP.
- The master server periodically synchronizes with the LDAP server(s) to run the Active, Org name, and Role scripts. The scripts determine if any changes need to be made based on the user's current attributes and group membership. A user that is removed from LDAP is automatically deactivated during synchronization. The default synchronization interval is once every 12 hours.
- Mapping to a non-unique attribute can cause duplicate CrashPlan users with different usernames. For example, if you use the mail attribute for Username and the user has multiple email addresses listed in LDAP, a CrashPlan user is created for each email address.
LDAP integration helps to manage users, but it does not create them on its own. Create users alongside LDAP integration in one of three ways:
- Self-service: When users install the CrashPlan app and sign in as a new user, their accounts are automatically created. If their organizations are configured to use LDAP, then they must use their LDAP credentials, registration key, and Code42 server address to create their account.
- Deploy custom installers: Deploy preconfigured custom installers with software like Microsoft System Center Configuration Manager or Jamf Pro (formerly Casper Suite).
- Create users manually: Administrators can create users manually or by uploading a CSV list.
Step 1: Add an LDAP server to your master server
On the master server:
- Sign into the administration console.
- Go to Settings > Security > LDAP.
- Click Add to add a new LDAP server.
- Enter the following values:
- Server Name: Name for your LDAP server
- URL and search base: LDAP URL and search base for all queries
- LDAP Example:
ldap://demo.company.com:389/ou=users...company,dc=com
- LDAPS Example:
ldaps://demo.company.com:636/ou=user...company,dc=com
- LDAP Example:
- Bind DN and password (if required to search): A fully-qualified, distinguished account for Bind DN.
- Bind DN example:
uid=admin,ou=admins,dc=company,dc=com
- Bind DN example for Active Directory:
DOMAIN\exampleuser
- Bind DN example:
- Search Filter: The parameter specified before the
?
is the attribute used to identify the Code42 environment user.- Example LDAP filter to identify the user with UID:
(&(objectclass=person)(uid=?))
- Example LDAP filter to identify the user with email:
(&(objectclass=person)(email=?))
- Example AD filter to identify the user with AD login name:
(&(objectclass=person)(sAMAccountName=?))
- Example LDAP filter to identify the user with UID:
- Attribute Mapping: LDAP attributes to use for the Code42 environment user account fields:
- First name
- Last name
TIP: Use the username search field at the bottom to search or scroll through the list of users returned to check your settings.
- Click Save.
Step 2: Enable LDAP for your Code42 environment
Once your LDAP server is added to your master server, configure your Code42 environment to use the LDAP server for authentication. You can enable LDAP authentication system-wide for all organizations that inherit settings from the system-wide organization, or you can enable LDAP authentication only for specific organizations.
Before you begin
- Verify that the users in the organization(s) exist in LDAP.
- Verify that the Code42 environment usernames match an LDAP attribute.
Option A: Enable LDAP for a specific organization
- Sign in to the administration console on your master server.
- Navigate to Organizations, then select the organization.
- From the action menu, select Edit.
- Click Security.
- Deselect Inherit security settings from parent.
- From Select an authentication method, choose LDAP.
- From Select a directory service, choose LDAP.
The configured LDAP servers appear. - Select the LDAP server that you want to offer for the organization.
- Click Save.
Option B: Enable LDAP for all organizations
Modify the system-wide organization settings to enable LDAP for all organizations.
If inheritance is disabled for an organization, that organization is not affected by changes to its parent organization.
- Sign in to the administration console on your master server.
- Navigate to Settings > Organization > Security.
- From the action menu, select Edit.
- Click Security.
- From Select an authentication method, choose LDAP.
- From Select a directory service, choose LDAP.
The configured LDAP servers appear. - Select the LDAP server that you want to offer for the organization.
- Click Save.