Configure LDAP Authentication-only (standalone)#
This procedure sets up LDAP for authentication-only, in VOSS Automate.
Note
Users can be added locally or synced from CUCM:
Scenario where LDAP authentication is the default |
When users are LDAP synced in CUCM and then synced into VOSS Automate |
Scenario where LDAP authentication is not the default |
|
You can change the default behavior, as described in View and Update LDAP Authentication Users.
To set up LDAP for authentication-only …
Log in as Provider, Reseller, or Customer administrator.
Choose the hierarchy where you have the LDAP server set up (the server you’re using to authenticate users).
Go to (default menus) LDAP Management > LDAP User Sync.
Click Add.
Fill out the relevant details:
Field |
Description |
---|---|
LDAP Server |
Choose the LDAP Server where you are authenticating users. |
LDAP Authentication Only |
Disabled by default, which means users will be synced from the configured LDAP directory and their passwords are authenticated against that LDAP directory. When enabled:
|
User Model Type |
Read-only. Identifies the LDAP object (defined in the configured LDAP server), used to authenticate users. |
LDAP Authentication Attribute |
Mandatory. Choose the LDAP Attribute for authenticating users. Options are:
These are the same values CUCM uses for LDAP Attribute for User ID. Active Directory (AD) only: For these user types, don’t choose userPrincipalName, unless the userPrincipalName value was set as the Username when the user was created:
For users synced from LDAP into CUCM and then into VOSS Automate: Caveats (AD and OpenLDAP) For users synced from LDAP into CUCM and then into VOSS Automate:
If you sync users from LDAP into CUCM using employeeNumber, choose employeeNumber for the LDAP Authentication Attribute. However, to get the LDAP Authentication to work properly, one of these conditions must be met:
|
Click Save.
All users with
SyncToHierarchy
set to the hierarchy of the LDAP server now use the LDAP server for authentication. Users are added to the LDAP Authentication Users list.