API Management 10.4 | Using API Gateway | User Management | Manage Users, Groups, and Access profiles | Configuring API Gateway to Use LDAP
 
Configuring API Gateway to Use LDAP
If your site uses Lightweight Directory Access Protocol (LDAP) for user and group information, you can configure API Gateway to obtain user and group information from the external directory.
LDAP protocols are designed to facilitate sharing information about resources on a network. Typically, they are used to store profile information (login ID, password, and so on.). You can also use them to store additional information. API Gateway uses LDAP for performing external authentication.
Using your existing LDAP information allows you to take advantage of a central repository of user and group information. System administrators can add and remove users from the central location. Users do not need to remember a separate password for webMethods applications; they can use the same user names and passwords that they use for other applications. Remember to use your LDAP tools to administer users or groups stored in an external directory.
To configure the server to use LDAP, you need to:
*Instruct API Gateway to use the LDAP protocol.
*Define one or more configured LDAP servers that API Gateway is to use for these users.
*If an LDAP provider is SSL-enabled, you can set the watt.server.ssl.trustStoreAlias property to point to the trusstore alias that contains the certificates required to establish a secure connection with the LDAP server.
* To specify LDAP as the external provider
1. Expand the menu options icon , in the title bar, and select User management.
2. Click LDAP configuration.
3. Under Provider select LDAP.
4. Provide the following information:
Field
Description
Cache size (number of users)
Specifies the maximum number of LDAP users API Gateway can keep in memory in the user cache.
The default value is 10.
Once the limit is reached, API Gateway selects users for removal from the cache based on how long they have been idle. As a result, activity can extend the time a user remains in the cache.
Credential time-to-live (minutes)
Specifies the number of minutes an LDAP user's credentials (userid and password) can remain in the credential cache before being purged.
The default is 60 minutes.
When a user first attempts to log in, API Gateway creates a user object and checks the user's credentials against the LDAP directory. API Gateway stores the credentials so that subsequent requests to authenticate are made against the cached credentials, not the LDAP directory.
5. Click Save.

Copyright © 2015- 2019 | Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.
Innovation Release