Skip to main content

LDAP

The LDAP integration allows you to connect your Jadu Control Center to your LDAP or Active Directory domain.

To log in to Jadu, enabled LDAP users can either use their LDAP login details at the Control Center login screen, or they can be silently logged in using Integrated Windows Authentication (network architecture permitting).

note

LDAP integration is dependent on connectivity being available from your application server to your LDAP server.

  1. Click the Settings icon in the left navigation bar. The Settings menu will open.
  2. Click the Integrations link in the first group of links. A list of integrations will now be shown.
  3. Click the LDAP option in the list of integrations. The LDAP integration form will open.

LDAP fields

LDAP integration

FieldNotesRequired?
ProtocolThe connection protocol to use, either LDAP or LDAPS
Server addressThe address to use when connecting
Server portThe port number to use when connecting
Distinguished Name (DN)eg. 'ldap@example.com'
PasswordThe password to use when connecting
Login methodWhether login is cookie-based using the Jadu login screen, or uses integrated Windows authentication.
User search base DNThe point from which a server will search for users eg. 'dc=example,dc=com'
User search filterFilter to apply to search results eg. '(objectClass=*)'
Field MappingThe username and email fields that needs to be used when crawling data from LDAP server

Assigning field mappings

LDAP field mapping

Field mappings must be set before the LDAP integration can be enabled.

To set your field mappings, try the following:

  1. While editing the LDAP integration settings, click the Assign Field Mappings button. The Field mapping panel will open.
  2. Within the Field mapping panel, type a valid username in the Username field. The application will start to search for a matching account in your LDAP system.
  3. When the matching username is shown, select the username from the list of results.
  4. Select the LDAP fields to use as the username and email values when an LDAP account is added as an admin for Jadu Central.
  5. Click the Save button and the Field mapping panel will close.
  6. Click the Save button to save your changes and enable the LDAP integration.

Creating an LDAP authenticated admin

Once the LDAP integration has been enabled, you can add LDAP accounts as admins for Jadu Central. To do this, try the following:

  1. Click the Utilities icon in the left navigation bar. The Utilities menu will open.
  2. Click the Admin Privileges link in the third group of links. A list of admins will now be shown, with links to create new admins if your account has the appropriate access permissions.
  3. Click the New Admin button. The admin entry form will open. Complete the form to create a profile for your administrator and save the record.
  4. Locate the new admin in the adminstrators list and open the record. Click the Link External Account button. The Link to External Account window will open.
  5. Select LDAP as the identity provider to link to. Enter the LDAP username in the search field. The application will start to search for a matching account in your LDAP system. When the matching account is shown, click the username in the list of search results.
  6. Click the Save button to save the changes.
note

The name and email address associated with the LDAP account are imported from the LDAP server each time the user logs into the application.

Troubleshooting

If you're having difficulty setting up LDAP integration with Jadu Central, please check the following:

  1. Ensure that the application server can communicate with the LDAP server. For example, if you have a proxy in place this may require the proxy settings of the application to be updated.

  2. LDAP always searches for SAMAccountName. Ensure that this field is set within your LDAP system configuration.

  3. Usernames with periods (.) are not allowed within Jadu Central. If your LDAP account name includes periods you will not be able to add that account as admins of Jadu Central.