You can use the ldap command to configure the Exinda appliance to authenticate user login attempts with a remote LDAP (including Active Directory) server.
ldap {base-dn|bind-dn|bind-password|group-attribute|group-dn|host|login-attribute|port|referrals|scope|ssl|timeout-bind|timeout-search|version}
To configure the LDAP user search base:
ldap base-dn <string>
To configure the distinguished name (DN) to bind to the server:
ldap bind-dn <string>
To specify the password for binding to the server:
ldap base-password <string>
To specify the name of the group membership attribute:
ldap group-attribute {<string>|member|uniqueMember}
To specify the distinguished name of the group required for authentication:
ldap group-dn <string>
To specify the hostname or IP address of the LDAP server:
ldap host <hostname or IP address>
To specify the attribute that contains the login name:
ldap login-attribute {<string>|uid|sAMAccountName}
To specify the port of the LDAP server:
ldap port
To enable LDAP referrals:
ldap referrals
To specify to scope of the LDAP search:
ldap scope {one-level|subtree}
To configure the SSL and TSL settings:
ldap ssl {cert-verify|mode {none|ssl|tls}|ssl-port}
To specify the number of seconds before LDAP times out for binding to a server:
ldap timeout-bind <seconds>
To specify the number of seconds before a search for user information on the LDAP server times out:
ldap timeout-search <seconds>
To configure the version of LDAP that is supported:
ldap version {2|3}
|
|