Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To retrieve user group information from an IdP, complete the following on the User Group Sync tab:

Authentication Profile: Choose an enabled authentication profile you want to use to retrieve user groups. Only enabled profiles are available for selection.

...

For information about how to create authentication profiles, see Configuring Authentication Profiles.

For LDAP profiles (for MS AD Sync), complete the following:

  • User Name: Enter the username for logging in to the Microsoft Active Directory server.
  • Password: Enter the password for logging in to the Microsoft Active Directory server.
  • On-prem Host: Choose the host with which you have associated the LDAP profile from the list
  • Expiration: Choose the time duration you want the system to keep the user group information. The default is 48 hours.
Note
titleNote

Ensure that you enable the MS AD Sync service for the synchronization to work. For information, see Enabling and Disabling Services on Servers.


Info
titleAdvisory

SSL related error while trying to sync the groups 
If you receive the following message: 'Error status “LDAP Result Code 52 \"Unavailable' it is an indication that the login has failed due to the user directory is unavailable for authenticating the user. Configuring LDAP over SSL in the Server should resolve the issue. In MS AD  "Active Directory Certificate Services" must be installed in order to have CA installed. If that is not done, SSL related errors may be encountered when attempting to sync the groups. 

Do keep in mind that connectivity between the AD server and Infoblox Platform encrypts the communication channel using SSL/TLS protocol depending upon what’s supported by the server/client. It is a requirement that AD Server should have at least SSL protocol enabled and a self-signed certificate applied.

To remedy this issue, the following checks to the server should be performed: 

  • Check if the AD Server has at least SSL protocol enabled and a self-signed certificate applied and is valid.
  • To verify if SSL is enabled or not, please check the value for:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client\DisabledbyDefault (1 is enabled and 0 is disabled)
  • Please note that SSL and TLS are just sets of protocols but you will still require a certificate to digitally bind a cryptographic key.

For information on how to enable Transport Layer Security (TLS) protocol, see Configuring DNS Forwarding Proxy.


For SAML profiles, complete the following:

  • Admin Token: This is the authorization token from the IdP. Depending on the IdP you have selected in the authentication profile, refer to the respective vendor documentation on how to acquire an admin or API token.
  • Expiration: Choose the time duration you want the system to keep the user group information. The default is 48 hours.

For SAML profiles, complete the following:

  • Admin Token: This is the authorization token from the IdP. Depending on the IdP you have selected in the authentication profile, refer to the respective vendor documentation on how to acquire an admin or API token.
  • IdP Domain: This is the IdP domain for the IdP you set up.
  • Expiration: Choose the time duration you want the system to keep the user group information. The default is 48 hours.

Click Sync. When the synchronization is complete, available user groups are displayed in the Synced User Groups panel. 

The synchronized user groups are now available when you configure security policies. For information about security policies, see /wiki/spaces/DraftReview/pages/11567288see Configuring Security Policies.

The Synced User Groups panel displays the following information:

...