LDAP Authentication

The LDAP Authentication allows users to have the same credentials as in LDAP, effectively centralizing authentication. Enabling it will let any correctly authenticated LDAP user use HyperCX.

The credentials provided in the login screen will be sent to the HyperCX core and the authentication will be delegated to the HyperCX auth system using the specified driver for that user. Therefore, any HyperCX auth driver can be used through this method to authenticate the user (e.g., LDAP).

Requirements

You need to have your own LDAP server in the infrastructure. HyperCX doesn’t contain or configure any LDAP server, it only connects to an existing one. Also, it doesn’t create, delete, or modify any entry in the LDAP server it connects to. The only requirement is the ability to connect to an already running LDAP server, perform a successful ldapbind operation, and have a user able to perform searches of other users. Therefore no special attributes or values are required in the LDIF entry of the authenticating user.

Configuration

The configuration is done only through Virtalus Cloud Engineers in communication with the LDAP provider administrator.

User Management

By using the LDAP authentication module the administrator doesn’t need to create users, as this will be done automatically, after first attempt of login.

Active Directory

LDAP Auth drivers are able to connect to Active Directory. You will need:

  • An Active Directory server with support for simple user/password authentication.
  • A user with read permissions in the Active Directory user tree.

Group Mapping

You can make new users belong to a specific group or groups. To do this a mapping is generated from the LDAP group to an existing HyperCX group.

Group Admin. Mapping

Each group in HyperCX can have its admins that have administrative privileges for the group. Also, this attribute could be controlled by the LDAP driver.