Skip to main content Skip to complementary content

Setting up an LDAP(S) protocol

About this task

If you use an LDAP or LDAPS directory to list your resources, in particular your personnel, you can use this directory to authenticate the Administration Center users. For more information on how to configure the keystore for LDAPS, see Configuring LDAP(S) for Talend Administration Center.

Procedure

  1. On the Menu, click Configuration and then click the LDAP group to display the parameters.
  2. Set the parameters as the following:

    Parameter

    Value

    UseLDAPAuthentication

    Select true to activate LDAP authentication or false to deactivate it from the drop-down list.
    Information noteNote: If Personal Access Token is enabled, when LDAP Authentication is enabled or disabled, all LDAP users' Personal Access Token will be reset. For more information, see Setting up the Security Policy.

    Enable LDAPS

    Select true to activate LDAP over SSL (LDAPS) authentication or false to deactivate it from the drop-down list.

    Enable Referral This feature is adopted when users are defined in different servers for organizational reasons and referred nodes are implemented between two LDAP servers.
    Information noteNote: Make sure the LDAP server supports referral search. A referral user must have been created beforehand in LDAP.

    Select true to activate the redirection of a client request to another server.

    Then you can import or add the referral user. For more information, see Importing user accounts from LDAP server and How to add a user.

    Host

    Type in the IP address and the host of the LDAP server.

    Port

    Type in the port of the LDAP server.

    Ldap principal DN prefix

    Type in the login of the user who has the right to search on the specified root or branch.

    Admin password

    Type in the password of the user who has the right to search on the specified root or branch.

    Login field

    Type in the name of the attribute representing the data that corresponds to the user's login.

    The name must correspond to one of the LDAP fields defined in your LDAP configuration and the value must not be empty.

    Email field

    Type in the name of the attribute representing the data that corresponds to the user's Email.

    The name must correspond to one of the LDAP fields defined in your LDAP configuration and the value must not be empty.

    Firstname field

    Type in the name of the attribute representing the data that corresponds to the user's Firstname.

    The name must correspond to one of the LDAP fields defined in your LDAP configuration and the value must not be empty.

    Lastname field

    Type in the name of the attribute representing the data that corresponds to the user's Lastname.

    The name must correspond to one of the LDAP fields defined in your LDAP configuration and the value must not be empty.

    Use LDAP login/password

    Select true so that Talend Administration Center credentials are used to login to Git. In this case, Talend Studio checks user credentials directly against the LDAP.

    When setting the option to false, the previously defined mappings in the fields below are not cleared.

    GitLogin field

    Type in name of the attribute representing the data that corresponds to the user's GIT login. This field must correspond to the field defined in your LDAP configuration.

    If you use the LDAP system to handle the Git credentials, the recommended way is to edit these credentials through LDAP and not through the Users page as Talend Administration Center will automatically retrieve the changes done on these credentials.

    GitPassword field

    Type in name of the attribute representing the data that corresponds to the user's GIT password. This field must correspond to the field defined in your LDAP configuration.

    If you use the LDAP system to handle the Git credentials, the recommended way is to edit these credentials through LDAP and not through the Users page as Talend Administration Center will automatically retrieve the changes done on these credentials.

    For more information on how to manage encryption of the Git password in LDAP for Talend Administration Center, see the documentation on Managing encryption of Git passwords in LDAP for Talend Administration Center.

    Once the LDAP authentication is activated, the creation of the user account in the Users page is modified. From now on, only the Distinguished name is required as the other information about the user is retrieved from the LDAP directory. This way, user's login and password used to connect to Talend Administration Center or to Talend Studio are those defined in the LDAP directory.
    You can configure the LDAP connection time out by editing the value of the ldap.config.timeout property in milliseconds in the database configuration table. The defaut value is 2000.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – please let us know!