Skip to main content
Version: Axidian CertiFlow 7.2

LDAP

Axidian CertiFlow supports the following LDAP catalogs: Active Directory, Samba AD DC, FreeIPA.

A LDAP catalog can be compound. It can pull user information from different containers within a single domain or from multiple domains.

About Samba AD DC

Samba AD DC is able to serve as an Active Directory domain controller or as a primary domain controller.

If Axidian CertiFlow was previously configured to work with a user catalog in Active Directory, and the domain controller is reconfigured to Samba AD DC, do not change the existing user catalog configuration parameters.

When you configure the connection to Samba AD DC user catalog for the first time, select this catalog type when you configure a connection to the catalog in the Axidian CertiFlow Installation Wizard.

Configure a catalog

Create a service account

Create a service account for reading and writing user attributes.

Active Directory

  1. Launch the Active Directory Users and Computers (ADUC) snap-in.
  2. Expand the domain tree and select the container or organizational unit that you want to host the user account.
  3. On the Action menu, select CreateUser.
  4. Enter the name of the service account.
  5. Fill in the required fields and click Finish to create the account.

Samba AD DC

Create a service account in Active Directory Users and Computers (ADUC) snap-in or using the samba-tool command line:

  1. Create a user:

    samba-tool user add <user name>
    samba-tool user add servicecertiflow
  2. If you plan to use the service account as role administrator in Axidian CertiFlow management console, add the UPN (User Principal Name) attribute:

    sudo samba-tool user rename <user name> --upn=<UPN>
    sudo samba-tool user rename servicecertiflow --upn=servicecertiflow@domain.name

Configure permissions

  1. Launch the Active Directory Users and Computers snap-in.
  2. Go to the Security tab of the object which contains the Axidian CertiFlow users.
  3. Click AdvancedAddSelect a principal.
  4. In the Enter the object names to select text box, type the service account name and click OK.
  5. In the Apply to dropdown list, select Descendant User objects.
  6. In the Permissions list, select:
    • List contents.
    • Read all properties. By default, all domain service accounts have a permission to read all user properties.
    • Reset password
  7. In the Properties list, select:
    • Write pwdLastSet
    • Write thumbnailPhoto or Write jpegPhoto
    • Write userAccountControl
    • Write userCertificate
  8. Click OK and Apply.
info

Grant the service account the same set of permissions for each object which contains the Axidian CertiFlow users.

Grant read permissions

If domain security policies prohibit reading all user properties, grant the service account permissions to read user attributes and attributes of the object which contains the Axidian CertiFlow users:

  1. In the ADSI edit snap-in, right-click the relevant object and go to Properties Security.
  2. In the Apply onto list, select This object and all descendant objects and configure the following settings:
    1. In the Permissions list, check List contents box.
    2. In the Properties list, check the following boxes:
      • Read сanonicalName
      • Read Distinguished Name
      • Read objectClass
      • Read objectGuid
      • Read showInAdvancedViewOnly
  3. In the Apply onto list, select Descendant user objects:
    1. In the Permissions list, check List contents.
    2. In the Properties list, select read/write for the following properties and attributes:
      • Read personal Information
      • Read general Information
      • Read account restrictions
      • Read public Information
      • Write pwdLastSet
      • Write thumbnailPhoto or Write jpegPhoto
      • Write userAccountControl
      • Write userCertificate
Supported user attributes
info

The following table lists LDAP Display Names of the catalog attributes.

It is recommended to grant access to property sets. For more information about property sets, see Microsoft's documentation.

Attribute (LDAP Display Name)Common NameInfo
cCountry/Region or Country/Region AbbreviationPersonal Information property set
сanonicalNameCanonical NamePublic Information property set
cnCommon NamePublic Information property set
companyCompanyPublic Information property set
**departmentDepartmentPublic Information property set
distinguishedNameDistinguished NamePublic Information property set
givenNameGiven NamePublic Information property set
lLocality NamePersonal Information property set
mailE-mail AddressesPublic Information property set
managerManagerPublic Information property set
objectClassObject ClassPublic Information property set
objectGUIDОbject GUIDPublic Information property set
objectSidObject SidGeneral Information property set
otherMailboxOther MailboxPublic Information property set
proxyAddressesProxy AddressesPublic Information property set
pwdLastSetPwd Last SetAccount Restrictions property set
sAMAccountNameSAM Account NameGeneral Information property set
snSurnamePublic Information property set
stState or Province NamePersonal Information property set
streetAddressAddress (or Street)Personal Information property set
telephoneNumberTelephone NumberPersonal Information property set
thumbnailPhoto or jpegPhotoPicturePersonal Information property set
userAccountControlUser Account ControlAccount Restrictions property set.
userCertificateUser CertificatePersonal Information property set
userPrincipalNameUser Principal NamePublic Information property set