6.7
Lightweight Directory Access Protocol
The Lightweight Directory Access Protocol (LDAP) is used on the RamSan to provide central
authentication of login credentials in addition to any local users.
Note:
Users that are authenticated on the LDAP server will be granted user-level permissions.
When the LDAP license is installed, this feature is not immediately enabled. The RamSan’s
LDAP settings must first be configured to match the server. The following settings can be
configured with the LDAP wizard in the “
Management
”/“
Users
” node (see Figures 39 and 40).
Host
This is your LDAP server. It must be resolvable without using LDAP. Multiple hosts may
be specified, each separated by a space.
Base DN
This is the distinguished name of the search base.
Port
(Optional)
This is the port that will be used to connect to the LDAP server. Leaving this defaulted
will use port 389 for TLS or no encryption, and port 636 for SSL encryption. If you use a
different port, make sure to specify it in this field.
Bind DN
(Optional)
This is the distinguished name that will be used for binding to the LDAP server. If left
defaulted, the RamSan will try to bind anonymously.
Bind Password
(Optional)
This is the password that the LDAP server will use to authenticate the “
Bind DN
” when
the RamSan tries to bind.
Timeout
This is the timeout in seconds to wait for an LDAP search operation.
Bind Timeout
This is the timeout in seconds to wait for an LDAP bind operation.
Encryption
Choose which type of encryption to use for communication with the LDAP server.
RamSan-810 User’s Manual
- 54 -
Texas Memory Systems, Inc.