You can connect BI Validator to an external authentication server, such as Microsoft Active Directory. This allows BI Validator to authenticate users using their credentials stored in the LDAP directory. You then assign groups to the users and control which users will have the permissions to the test plans.
||Administrators are still required to create users manually and indicate that the user is available in the LDAP directory.
Add an LDAP Connection
To add a new ALM connection, click the Settings menu icon and click Manage LDAP Connections. In the Manage LDAP Connections page, click New, complete all the connection details, click Test to check if the connection is successful, and click Save.
Edit an LDAP Connection
To edit an LDAP connection, click the Settings menu icon and click Manage LDAP Connections. In the Manage LDAP Connections page, click the edit icon in the row of the LDAP connection you want to edit, modify the connection details, and click Save.
Delete an LDAP Connection
To delete an LDAP connection, click the Settings menu icon and click Manage LDAP Connections. In the Manage LDAP Connections page, click the delete icon in the row of the LDAP connection you want to delete. In the Confirmation message box that appears, click OK.
LDAP Connection Details
The following are the LDAP connection details.
Enter a name for the LDAP connection.
This is the hostname or IP address of the LDAP server.
This is the port number of the LDAP server. The default port number is 389; while connecting over SSL, the port number is 636.
Select from the following authentication types:
- Anonymous. An LDAP request without doing a "bind" is treated as an anonymous client.
- Secure. An LDAP request is sent over the TLS connection.
- Secure Socket Layer. An LDAP request is sent over the SSL certificate.
The username of the LDAP user with which you will connect to the LDAP server.
The password of the LDAP user.
This is the portion of the LDAP directory from where BI Validator application will start looking for users and groups. For example, dc=example,dc=local.
This is the starting place to look for users and groups in the LDAP directory. Typically, user domain is located under the base domain. For example, ou=Users,dc=example,dc=local.
Allows you to verify whether the LDAP connection is working successfully.
© Datagaps. All rights reserved.
Send feedback on this topic to Datagaps Support