MashZone NextGen 10.2 | Appendix | Administration | Getting Started with the MashZone NextGen Server | Integrate Your LDAP Directory with MashZone NextGen
 
Integrate Your LDAP Directory with MashZone NextGen
 
Defining LDAP Connection Configuration
Defining the Authentication Scheme
Defining the Authorization Scheme
Enabling MashZone NextGen Application Queries for All LDAP Users or Groups for Permissions
In many cases, users and authentication information for an organization is defined in an existing LDAP Directory. You can configure MashZone NextGen to use your LDAP Directory as the source for user and group information.
Note: See the System Requirements for Software AG Products guide for information on MashZone NextGen support for specific LDAP Directory solutions.
To configure your LDAP Directory as the MashZone NextGen User Repository:
1. If the MashZone NextGen Server is not yet started, start MashZone NextGen.
2. Change MashZone NextGen configuration to use LDAP as the authentication provider.
a. Edit the userRepositoryApplicationContext.xml file in the MashZoneNG-config folder with any text editor.
Note: This folder may be in the default location or in an external location.
b. Remove the comment markers around this statement: <import resource="/userRepositoryApplicationContext-ldap.xml">.
c. Comment out this statement: <import resource="/userRepositoryApplicationContext-jdbc.xml"> property.
Note: You cannot use both default authentication and LDAP authentication.
The configuration should look something like this:
<beans>
<!-- Choose between the interal JDBC repository and LDAP comment/uncomment
these two import statements -->
<import resource="/userRepositoryApplicationContext-ldap.xml">
<!-- <import resource="/userRepositoryApplicationContext-jdbc.xml"> -->
...
</beans>
3. Change MashZone NextGen configuration for the user attribute provider.
a. If it is not already open, edit the userRepositoryApplicationContext.xml file in the MashZoneNG-config folder with any text editor.
Note: This folder may be in the default location or in an external location.
b. Find the userAttributeProvider bean:
<bean id="userAttributeProvider"

>
...
c. Remove comment markers around the ldapAttributeProvider bean reference in the providers property list.
The configuration should now look something like this:
<bean id="userAttributeProvider"

>
<property name="providers">
<list>
<ref bean="ldapAttributeProvider"/>
<ref bean="internalUserAttributeProvider"/>
</list>
</property>
</bean>
d. Save your changes to this file.
Important: Do not restart the MashZone NextGen Server until all other LDAP configuration steps have been completed.
4. Define configuration in the Admin Console in MashZone NextGen Hub for:
*Connections to the LDAP Directory. See Defining LDAP Connection Configuration.
*Authentication mechanisms. See Defining the Authentication Scheme.
*Authorization mechanisms. See Defining the Authorization Scheme.
*All user and group queries used in MashZone NextGen applications. See Enabling MashZone NextGen Application Queries for All LDAP Users or Groups for Permissions.
5. Add the built-in MashZone NextGen user groups to LDAP as new groups and assign at least one user as a MashZone NextGen administrator.
6. Restart the MashZone NextGen Server.
MashZone NextGen now uses LDAP as the user repository. You can now login using the user account assigned in earlier steps as a MashZone NextGen administrator.
To grant access to other users, add them to an appropriate built-in MashZone NextGen user group in LDAP.

Copyright © 2013-2018 | Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.
Innovation Release