Creating an Active Directory Server Connection
On the Active Directory page, click New. The Create New Server Connection page opens. Complete the fields below, then click OK.
When finished, proceed to Adding Users and Roles from an Active Directory Connection.
Create New Server Connection
Name
Provide a name for the connection.
Host
The host name of the Active Directory server.
Note: If Authentication Method (below) is SASL, and Host is an IP address, you must also specify a Realm.
From AD Explorer:
- Select File > Connect..., and click OK, leaving all values blank.
- If AD Explorer successfully connects to Active Directory, the hostname is printed in square brackets.
From a domain computer:
- Open a command prompt (cmd.exe) via the Start menu.
- Type gpresult /r to display the policy information for the current user.
- The Active Directory server appears under 'Group Policy was applied from'.
Port
The port that is used to communicate with the Active Directory server. Most common Windows domain configurations use port 389 or 636.
Domain Search User
A Windows Service Account to use for importing Active Directory users and groups into FME Server. This account requires read access to the domain controller.
Specify the account in any of the following formats:
Format |
Syntax |
Example |
---|---|---|
NT Login | DOMAIN\username | MYCOMPANY\User1 |
User Principal Name | username@domain.net | User1@MYCOMPANY.INTERNAL |
Distinguished Name | CN=...,OU=...,DC=... | CN=User One,OU=Service Accounts,OU=My Company,DC=company,DC=internal |
- From AD Explorer, connect to the Active Directory.
- Browse for and select the entry representing the account.
- The service account name appears under the sAMAccountName' attribute.
Domain Search Password
The password of the Active Directory account.
Synchronization Enabled
When checked, relationships between users and groups in FME Server are synchronized with the Active Directory at specified intervals. For example, consider User_1 who belongs to Group_1 in FME Server because of a corresponding relationship in Active Directory. If that relationship is subsequently broken in Active Directory, the relationship between User_1 and Group_1 will break in FME Server after the next synchronization interval.
Authentication
Encryption Method
The encryption method to use when authenticating with Active Directory.
- None: No encryption
- SSL/StartTLS: Communication with Active Directory is over secure sockets layer (SSL). If StartTLS is specified, SSL/TLS communication with Active Directory is initiated using the STARTTLS command.
Note: To use a certification authority (CA) certificate for SSL authentication, see Importing a CA Certificate for SSL Connections to Active Directory.
Authentication Method:
Specify the method of authenticating with Active Directory:
- Basic: SASL authentication is not enabled.
- SASL: Enables simple authentication and security level (SASL).
- SASL Mechanism:
- GSSAPI: Kerberos V5 authentication
- GSS-SPNEGO: Simple and Protected GSSAPI Negotiation Mechanism
- EXTERNAL: Context-implicit authentication
- DIGEST-MD5: MD5 message digest
- Use Single Sign-On: If checked, allows users imported from this connection to auto-connect to FME Server with their Windows credentials.
- SSO Username: The name of the Windows Service Account to configure for single sign on, in the format USERNAME (do not specify DOMAIN).
- From AD Explorer, connect to the Active Directory.
- Browse for and select the entry representing the account.
- The service account name appears under the sAMAccountName' attribute.
- SSO Password: The Windows service account password.
- Key Distribution Center: (Optional) If SASL Mechanism is GSSAPI, specify the host name or IP address of the Kerberos key distribution centre (KDC). If not specified, the KDC is assumed to be located on the same server as the Active Directory domain controller.
- Realm: If SASL Mechanism is GSSAPI or DIGEST-MD5, specify the authentication realm for Kerberos V5 or MD5 message digest authentication. In terms of Active Directory, the authentication realm is the domain name. Specify the capitalized version of the domain name, in its fully-qualified domain name (FQDN) form. For example, if the FQDN is domain.net, use DOMAIN.NET. If not specified, the authentication realm is assumed to be the domain name of the Active Directory Domain Controller.
- Open a command prompt (cmd.exe) via the Start menu.
- Do either of the following:
- Type echo %USERDNSDOMAIN% to display the USERDNSDOMAIN environment variable.
- The FQDN will print.
- Type net config workstation to display the network settings for the computer.
- The FQDN appears under the 'Workstation Domain DNS Name' field.
- Open 'Active Directory Domains and Trusts' from the Start menu.
- In the console tree (left-hand column), a list of Windows domains are listed by their FQDNs.
Note: To use Single Sign-On, you must also update your Windows domain and web browser configurations. For more information, see Configuring Integrated Windows Authentication.
To get the Service Account nameNote: If Host is an IP address, you must specify a Realm.
To get the fully-qualified domain name (FQDN):From a domain computer:
OR:
From the domain controller:
- SASL Mechanism:
Advanced
Search Bases
(Optional) Specify the distinguished name of a section (sub-tree) of the Active Directory that is accessible to the connection. Any sections not specified are not accessible. If not specified, the entire directory is accessible.
- From AD Explorer, connect to the Active Directory.
- Browse the directory to determine the location of all users and security groups to be provided access to FME Server.
- Select an entry to be used as the naming context.
- The distinguished name appears under the 'distinguishedName' attribute.
Username Attribute
(Optional) The Active Directory attribute to use for the names of the FME Server users who are imported from this connection. If not specified, the sAMAccountName attribute is used.
Full Name Attribute
(Optional) The Active Directory attribute to use for the full names of the FME Server users who are imported from this connection. If not specified, the displayName attribute is used.
Group Attribute
(Optional) The Active Directory group attribute to use for the names of the FME Server roles that are imported from this connection. If not specified, the sAMAccountName attribute is used.
Email Attribute
(Optional) The Active Directory attribute to use for the e-mail addresses of the FME Server users who are imported from this connection. If not specified, the mail attribute is used.
What's Next?
Proceed to Adding Users and Roles from an Active Directory Connection.