Authentication Use Case: LDAP

The Essential LDAP Scenario

In this scenario, user credentials are kept in an LDAP server external to Web Central.

The security service:

  1. Presents the login dialog.
  2. Receives the request with the login credentials (Username and password).
  3. Calls the LDAP server with the Username and password, LDAP server authenticates the user credentials.
  4. Loads the UserAccount object from a record in afm_users table for a given Username.
  5. Uses the UserAccount properties (security groups, VPAs) for the authorization.

For information on configuring this scenario, see Configuring the LDAP Authentication Use Case.

The following diagram illustrates LDAP authentication dependencies:

Mapping LDAP Users to Archibus Users

When you use an LDAP server for authentication, you need to map the user’s LDAP account to an Archibus account in the afm_users table.

There are three methods.

One-to-One

Active Directory (AD) users are mapped to their own unique Archibus identity. For instance, BIGUNIV\smith is mapped to the smith Archibus user, and BIGUNIV\davies is mapped to the davies Archibus user.

Many-to-One

All LDAP accounts are mapped to a single Archibus account (by default, user AFM).

Authority-by-Prefix

Each LDAP account has an authority (LDAP Group) with the specified prefix (by default, "Afm"). The LDAP Group with the specified prefix (Afm) will be used as the Archibus account name. For example:

For example: