Share:

You can connect ETL Validator to an external authentication server, such as Microsoft Active Directory. This allows ETL Validator to authenticate users using their credentials stored in the LDAP directory. You then assign containers and groups to the users and control which users will have the permissions to the test plans.

Information Administrators are still required to create users manually and indicate that the user is available in the LDAP directory.

Adding an LDAP Connection

  1. Navigate to Admin Options > LDAP SETTINGS.
  2. Click LDAP Connection + at the top-right corner (or at the center of the page).
  3. Enter the following fields:
    • Name. Enter a name for the LDAP connection. 
    • LDAP Host. This is the hostname or IP address of the LDAP server.  
    • LDAP User Name. The username of the LDAP user with which you will connect to the LDAP server. 
    • LDAP Password. The password of the LDAP user. 
    • LDAP Authentication. Select from the following authentication types:
      • Anonymous. An LDAP request without doing a "bind" is treated as an anonymous client. 
      • Secure.  An LDAP request is sent over the TLS connection.
      • Secure Socket Layer. An LDAP request is sent over the SSL certificate .
      • ReadOnlyServer. Use this authentication type to connect to the LDAP server with read-only access.
      • Fast BindFast bind mode allows a client to use the LDAP bind request to simply validate credentials and authenticate the client without the overhead of establishing the authorization information.
      • Signing. This authentication type determines whether the LDAP server requires LDAP clients to negotiate data signing. 
      • Sealing. Use this option if your LDAP server supports the optional use of integrity verification or encryption that is negotiated as part of the SASL authentication. 
      • Delegation. This authentication type manages delegated authentication at the permission level and not at the org level. Thus, gives you more flexibility.  
      • Server Bind. This type allows you to reuse the user accounts that you already have in the directory. Here, the search will be done via binding.
    • LDAP Port. This is the port number of the LDAP server.  
    • LDAP Base Domain. This is the portion of the LDAP directory from where ETL Validator application will start looking for users and groups. For example, dc=example,dc=local. 
    • LDAP User Domain. This is the starting place to look for users and groups in the LDAP directory. Typically, user domain is located under the base domain. For example, ou=Users,dc=example,dc=local.  
  4. Click Test to verify whether the connection is successful.
  5. Click Save to save the LDAP details.

PreviousNext

© Datagaps. All rights reserved.
Send feedback on this topic to Datagaps Support