Creating an Active Directory Server Connection
- On the Active Directory page, click Add. The Create New Server Connection page opens. Complete the fields:
- Select File > Connect..., and click OK, leaving all values blank.
- If AD Explorer successfully connects to Active Directory, the hostname is printed in square brackets.
- Open a command prompt (cmd.exe) via the Start menu.
- Type gpresult /r to display the policy information for the current user.
- The Active Directory server appears under 'Group Policy was applied from'.
- From AD Explorer, connect to the Active Directory.
- Browse for and select the entry representing the account.
- The distinguished name appears under the 'distinguishedName' attribute.
- From AD Explorer, connect to the Active Directory.
- Browse the directory to determine the location of all users and security groups to be provided access to FME Server.
- Select an entry to be used as the naming context.
- The distinguished name appears under the 'distinguishedName' attribute.
- Synchronization Interval: Specify the desired frequency of synchronization.
- None: No encryption
- SSL/StartTLS: Communication with Active Directory is over secure sockets layer (SSL). If StartTLS is specified, SSL/TLS communication with Active Directory is initiated using the STARTTLS command.
- Basic: SASL authentication is not enabled.
- SASL: Enables simple authentication and security level (SASL).
- SASL Mechanism:
- GSSAPI: Kerberos V5 authentication
- GSS-SPNEGO: Simple and Protected GSSAPI Negotiation Mechanism
- EXTERNAL: Context-implicit authentication
- DIGEST-MD5: MD5 message digest
- Use Single Sign-On: If checked, allows users imported from this connection to auto-connect to FME Server with their Windows credentials.
- SSO Username: The name of the Windows Service Account to configure for single sign on.
- From AD Explorer, connect to the Active Directory.
- Browse for and select the entry representing the account.
- The service account name appears under the sAMAccountName' attribute.
- SSO Password: The Windows service account password.
- Key Distribution Center: (Optional) If SASL Mechanism is GSSAPI, specify the host name or IP address of the Kerberos key distribution centre (KDC). If not specified, the KDC is assumed to be located on the same server as the Active Directory domain controller.
- Realm: If SASL Mechanism is GSSAPI or DIGEST-MD5, specify the authentication realm for Kerberos V5 or MD5 message digest authentication. In terms of Active Directory, the authentication realm is the domain name. Specify the capitalized version of the domain name, in its fully-qualified domain name (FQDN) form. For example, if the FQDN is domain.net, use DOMAIN.NET. If not specified, the authentication realm is assumed to be the domain name of the Active Directory Domain Controller.
- Open a command prompt (cmd.exe) via the Start menu.
- Do either of the following:
- Type echo %USERDNSDOMAIN% to display the USERDNSDOMAIN environment variable.
- The FQDN will print.
- Type net config workstation to display the network settings for the computer.
- The FQDN appears under the 'Workstation Domain DNS Name' field.
- Open 'Active Directory Domains and Trusts' from the Start menu.
- In the console tree (left-hand column), a list of Windows domains are listed by their FQDNs.
Note: To use Single Sign-On, you must also update your Windows domain and web browser configurations. For more information, see Configuring Integrated Windows Authentication.
To get the Service Account nameNote: If Host is an IP address, you must specify a Realm.
To get the fully-qualified domain name (FQDN):From a domain computer:
OR:
From the domain controller:
- SASL Mechanism:
- When finished, click OK.
Name: Provide a name for the connection.
Host: The host name of the Active Directory server.
Note: If Authentication Method (below) is SASL, and Host is an IP address, you must also specify a Realm.
From AD Explorer:
From a domain computer:
Port: The port that is used to communicate with the Active Directory server. Most common Windows domain configurations use port 389 or 636.
Domain Search User: The distinguished name of the Active Directory account.
Domain Search Password: The password of the Active Directory account.
Search Bases: (Optional) Specify the distinguished name of a section (sub-tree) of the Active Directory that is accessible to the connection. Any sections not specified are not accessible. If not specified, the entire directory is accessible.
Synchronization Enabled: When checked, relationships between users and groups in FME Server are synchronized with the Active Directory at specified intervals. For example, consider User_1 who belongs to Group_1 in FME Server because of a corresponding relationship in Active Directory. If that relationship is subsequently broken in Active Directory, the relationship between User_1 and Group_1 will break in FME Server after the next synchronization interval.
Encryption Method: The encryption method to use when authenticating with Active Directory.
Note: To use a certification authority (CA) certificate for SSL authentication, see Importing a CA Certificate for SSL Connections to Active Directory.
Authentication Method: Specify the method of authenticating with Active Directory:
Username Attribute: (Optional) The Active Directory attribute to use for the names of the FME Server users who are imported from this connection. If not specified, the sAMAccountName attribute is used.
Full Name Attribute: (Optional) The Active Directory attribute to use for the full names of the FME Server users who are imported from this connection. If not specified, the displayName attribute is used.
Group Attribute: (Optional) The Active Directory group attribute to use for the names of the FME Server roles that are imported from this connection. If not specified, the sAMAccountName attribute is used.
Email Attribute: (Optional) The Active Directory attribute to use for the e-mail addresses of the FME Server users who are imported from this connection. If not specified, the mail attribute is used.