Remember the following when configuring LDAP:
The Notify user before password expires and Allow user to change password when notifiedsettings in the Password management area have some constraints:
They are supported only on IBM Directory Server.
They are available only for users who connect to the appliance using Web access (the translated, custom port mapped, or custom FQDN mapped Web access), or using Connect Tunnel.
Users must have permission on the LDAP server to change their passwords.
The Login DN and Password fields are not always required in order to connect to an LDAP server. However, if they are not provided (or you do not specify a password), the appliance binds to LDAP anonymously, which does not usually provide the appropriate permissions for performing user and group information searches.
To configure an LDAP authentication server with username and password validation
In the AMC, navigate to System Configuration > Authentication Servers.
Click New.
Under Authentication directory, click LDAP.
In the Name field, type a name for the authentication server.
Complete the information listed under General:
In the Primary LDAP server field, type the host name or IP address of your LDAP server. If you are using a failover server (optional), specify its address in the Secondary LDAP server field.
If the LDAP server is listening on a something other than the well-known port (389 for
unencrypted LDAP connections, or 636 for SSL connections), specify a port number as a
colon-delimited suffix (for example, myldap.example.com:1300).
In the Password field, type the password used to establish a connection with the LDAP server.
ou=Users,o=xyz.com. The user
binding to the LDAP directory must have permissions to view the directory at this level.cn or
uid.Click the Test button for each server you specified in order to test the connection.
Complete the information listed under Group lookup:
To secure the LDAP connection with SSL, complete the information under LDAP over SSL:
To secure the LDAP connection with SSL, select the Use SSL to secure LDAP connection checkbox.
View your certificate details and verify that the root certificate can be used by the appliance. See Importing CA Certificates for details.
To configure the appliance to verify that the LDAP host name is the same as the name in the certificate presented by the LDAP server, select the Match certificate CN against LDAP server name checkbox. Typically, your server name will match the name specified in its digital certificate. If this is the case with your server, SonicWall recommends enabling this option in a production environment. This makes it more difficult for an unauthorized server to masquerade as your LDAP server if your digital certificate or DNS server is compromised.
Optionally, complete the information listed under Advanced.
You can allow users to change their passwords (in WorkPlace only) by selecting Enable user-initiated password change. If a realm is configured with stacked authentication and requires two sets of username/password credentials, a user who changes his or her password will be changing the credentials for just the first of the two authentication servers.
To enable NTLM authentication forwarding, click one of the Domain authentication forwarding options. For more information, see NTLM Authentication Forwarding.
To configure authentication that includes an OTP, enable Use one-time passwords with this authentication server.
In the From address field, enter the email address from which the OTP will be sent.
The Secondary email address attribute, if specified, is used in addition to the primary email address. The OTP is sent to both addresses.
To have OTPs sent as a text message (instead of an email message), enter the corresponding
attribute name (for example, SMSphone instead of Mail or primaryEmail). See Configuring the AD or LDAP Directory Server for more information.
Message successfully sent is displayed below the button.
Failure messages are also displayed below the button, such as errors connecting to the SMTP
server, or errors communicating with the AD/LDAP server or looking up the specified user on the
AD/LDAP server.You can configure OTP to be delivered through SMS and Email or only through SMS or only through Email. Same OTP will be delivered through both the channels.
When you are upgrading from prior versions of SMA to 12.4, TOTP service and the configuration information is automatically moved from global configuration to authentication server.
If you have not configured any trusted networks, TOTP account registration is allowed from any network.
Click Save.