If you want to use LDAP user/group names for authentication and policy configuration
purposes, you must set IWSVA’s user identification feature to use your corporate LDAP
server.
-
Select Administration > IWSVA Configuration > User Identification | User Identification tab from the main menu.
-
Enter the Domain, Service Account, and Password of the LDAP server and click Test Connection to validate the LDAP connection.
-
Under the User/group Authentication Settings section in the LDAP Settings section,
click the Server Type drop-down list and choose the type of LDAP server on your network.
-
Click Save to preserve your settings.
-
If you have multiple LDAP domains or multiple LDAP server types, choose Advanced (other
or multiple LDAP servers).
-
Enter the LDAP Domain Name.
-
When the LDAP server is a Microsoft Active Directory, "Auto Detect" will be available
to detect and automatically fill the domain settings. Enter the "Admin account" and
Password for a credential with at least read authority to the LDAP server. If the
domain is us.example.com:
-
For Microsoft Active Directory, use the UserPrincipalName for the admin account, for
example,NT_Logon_ID@us.example.com.
-
For OpenLDAP, enter the Distinguished Name (DN) for the admin account (for example,
uid=LOGON_ID,ou=People,dc=us,dc=example,dc=com).
-
When the LDAP server is a Microsoft Active Directory, configure LDAP encryption:
-
If you do not want to use the LDAP encryption, select None for LDAP Encryption.
-
If you want to use the LDAP encryption, select LDAPv3 StartTLS extension or LDAP over SSL for LDAP Encryption.
-
Enter the Listening port number used by the LDAP server that you have chosen (default
= 389). If your network has multiple Active Directory servers and you have enabled
the Global Catalog (GC) port, change the listening port to 3268.
 |
Note
If you enable the Global Catalog in Active Directory, you might need to configure
your firewall to allow communication through port 3268.
|
-
Enter the LDAP server's hostname using the Fully Qualified Domain Name (FQDN).
-
Enter the Base distinguished name to specify from which level of the directory tree
you want IWSVA to begin LDAP searches.
The base DN is derived from the company's DNS domain components; for example, LDAP
server us.example.com would be entered as DC=example, DC=com.
If you are using Active Directory servers with the Global Catalog (GC) port enabled,
use the root domain of the Global Catalog-enabled Active Directory; for example, use
dc=example,dc=com.
-
Select the LDAP authentication method to use—either Simple, Digest-MD5, or Kerberos.
Additionally, configure the following parameters to use Advanced authentication:
-
Default Realm
-
Default Domain
-
KDC and Admin Server: The hostname of the Kerberos key distribution server. If you
are using Active Directory, this is typically the same host name as your Active Directory
server.
-
KDC port number: Default port = 88
When using NTLM to authenticate with KDC(s) on a different forest through Internet
Explorer or using IWSVA to do referral chasing with Active Directory, Trend Micro
recommends enabling "Use HTTP 1.1 through proxy connections." This setting can be
found on the Internet Explorer Tools menu > Internet Options > Advanced tab. Enabling this setting prevents Internet Explorer from cutting off the "Keep-Alive
connection" setting. Note that using NTLM is only supported with Microsoft Active
Directory.
-
Configure the Approved LDAP Authentication List to exempt hosts from the LDAP authentication process.
For example, if you have an application server that access the Internet and you want
to permit its access without requiring the server to authenticate, you can include
the server’s IP address in the approved LDAP authentication list.
IWSVA will only apply IP address-based policy settings and bypass user/group name
checking.
IWSVA supports LDAP queries from IPv6 with similar behavior to that of IPv4. The approved
LDAP client list supports IPv6 addresses similar to that of IPv4 as well. The LDAP
Authentication request dialog box supports IPv4 and IPv6 with port 9090, and IWSVA
can automatically redirect the authentication dialog box to IWSVA’s IPv4 or IPv6 address
to a client based on the client’s IP address version.
-
When the client uses an IPv4 address, IWSVA should send the redirect request with
IWSVA’s IPv4 address.
-
When the client uses an IPv6 address, IWSVA should send the redirect request with
IWSVA’s IPv6 address.
-
To verify the information has been entered correctly and IWSVA can communicate with
the LDAP servers that you configured, click Test LDAP Connection on the User Identification page.
A message appears, indicating that you have successfully contacted the LDAP server.
-
Click Save.