<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <title>Jive Software - Wildfire: LDAP Guide</title> <link href="style.css" rel="stylesheet" type="text/css"> </head> <body> <div id="pageContainer"> <a name="top"></a> <div id="pageHeader"> <div id="logo"></div> <h1>LDAP Guide</h1> </div> <div class="navigation"> <a href="index.html">« Back to documentation index</a> </div> <div id="pageBody"> <h2>Introduction</h2> <p> This document details how to configure your Wildfire installation to use an external directory such as Open LDAP or Active Directory. Integration with a directory lets users authenticate using their directory username and password. Optionally, you can configure Wildfire to load user profile and group information from the directory. Any group in Wildfire can be designated as a shared group, which means that you can pre-populate user's rosters using directory groups. </p> <h2>Background</h2> <p> LDAP (Lightweight Directory Access Protocol) has emerged as a dominant standard for user authentication and for storage of user profile data. It serves as a powerful tool for large organizations (or those organizations integrating many applications) to simplify user management issues. Many LDAP servers are available, such as <a href="http://www.openldap.org/">Open LDAP</a>, <a href="http://www.microsoft.com/windowsserver2003/technologies/directory/activedirectory/">Active Directory</a>, and Novell's <a href="http://www.novell.com/products/edirectory/">eDirectory</a>. </p> <p> By default, Wildfire stores all user data in its database and performs authentication using database lookups. The LDAP module replaces that functionality and allows Wildfire to: <ul> <li>Use a LDAP server to authenticate a user's identity.</li> <li>Load user profile information from a LDAP directory.</li> <li>Load group information from an LDAP directory.</li> </ul> <b>Note:</b> Wildfire treats the LDAP directory as read-only. </p> <p> This document will guide you through configuring LDAP support in Wildfire. These instructions assume that you're a competent LDAP user, and that you're familiar with Wildfire setup issues. </p> <h2>Configuration</h2> <p> In order to configure your server to use LDAP: <ol> <li> Stop Wildfire. </li> <li>Edit <tt>conf/wildfire.xml</tt> in your Wildfire installation folder as described below. </li> <li> Restart Wildfire. </li> </ol> </p> <h3>Editing the Config File</h3> <p> Open the configuration file <tt>conf/wildfire.xml</tt> from your Wildfire installation in your favorite editor and add or change the following settings. Properties flagged with (<font color="red"> <b>*</b></font>) must be set. Properties flagged with (<font color="red"><b>**</b></font>) must be set in order to enable LDAP group support, all other properties are optional: </p> <ul> <b>Main Settings</b><br><br> <li>provider.user.className <font color="red"><b>*</b></font> -- set the value to "org.jivesoftware.wildfire.ldap.LdapUserProvider".</li> <li>provider.auth.className <font color="red"><b>*</b></font> -- set the value to "org.jivesoftware.wildfire.ldap.LdapAuthProvider".</li> <li>ldap.host <font color="red"><b>*</b></font> -- LDAP server host; e.g. localhost or machine.example.com, etc. It is possible to use many LDAP servers but all of them <b>should share the same configuration</b> (e.g. SSL, baseDN, admin account, etc). To specify many LDAP servers use the comma or the white space character as delimiter.</li> <li>ldap.port -- LDAP server port number. If this property is not set, the default value is 389.</li> <li>ldap.baseDN <font color="red"><b>*</b></font> -- the starting DN that searches for users will performed with. The entire subtree under the base DN will be searched for user accounts. </li> <li>ldap.alternateBaseDN -- a second DN in the directory can optionally be set. If set, the alternate base DN will be used for authentication and loading single users, but will not be used to display a list of users (due to technical limitations). <li>ldap.adminDN -- a directory administrator's DN. All directory operations will be performed with this account. The admin must be able to perform searches and load user records. The user does not need to be able to make changes to the directory, as Wildfire treats the directory as read-only. If this property is not set, an anonymous login to the server will be attempted. </li> <li>ldap.adminPassword -- the password for the directory administrator.</li> <li>ldap.usernameField -- the field name that the username lookups will be performed on. If this property is not set, the default value is <tt>uid</tt>. Active Directory users should try the default value <tt>sAMAccountName</tt>.</li> <li>ldap.nameField -- the field name that holds the user's name. If this property is not set, the default value is <tt>cn</tt>. Active Directory users should use the default value <tt>displayName</tt>.</li> <li>ldap.emailField -- the field name that holds the user's email address. If this property is not set, the default value is <tt>mail</tt>. Active Directory users should use the the default value <tt>mail</tt>.</li> <li>ldap.searchFields -- the LDAP fields that will be used for user searches. If this property is not set, the username, name, and email fields will be searched. An example value for this field is "Username/uid,Name/cname". That searches the uid and cname fields in the directory and labels them as "Username" and "Name" in the search UI. You can add as many fields as you'd like using comma-delimited "DisplayName/Field" pairs. You should ensure that any fields used for searching are properly indexed so that searches return quickly.</li> <li>ldap.searchFilter -- the search filter that should be used when loading users. If this property is not set, the default search will be for users that have the attribute specified by ldap.usernameField. <br><br> <b>Group Settings</b><br><br> <li>provider.group.className <font color="red"><b>**</b></font> -- set the value to "org.jivesoftware.wildfire.ldap.LdapGroupProvider".</li> <li>ldap.groupNameField <font color="red"><b>**</b></font> -- the field name that the groupname lookups will be performed on. If this property is not set, the default value is <tt>cn</tt>.</li> <li>ldap.groupMemberField -- the field name that holds the members in a group. If this property is not set, the default value is <tt>member</tt>.</li> <li>ldap.groupDescriptionField -- the field name that holds the description a group. If this property is not set, the default value is <tt>description</tt>.</li> <li>ldap.posixMode <font color="red"><b>**</b></font> -- a value of "true" means that users are stored within the group by their user name alone. A value of "false" means that users are stored by their entire DN within the group. If this property is not set, the default value is <tt>false</tt>. <b>Note:</b> the posix mode must be set correctly for your server in order for group integration to work.</li> <li>ldap.groupSearchFilter -- the search filter that should be used when loading groups. If this property is not set, the default value is <tt>("ldap.groupNameField"={0})</tt>.</li> <br><br> <b>Connection Settings</b><br><br> <li>ldap.debugEnabled -- a value of "true" if debugging should be turned on. When on, trace information about buffers sent and received by the LDAP provider is written to System.out</li> <li>ldap.sslEnabled -- a value of "true" to enable SSL connections to your LDAP server. If you enable SSL connections, the LDAP server port number most likely should be changed to 636.</li> <li>ldap.initialContextFactory -- the name of the class that should be used as an initial context factory. if this value is not specified, "com.sun.jndi.ldap.LdapCtxFactory" will be used instead. Most users will not need to set this value. <li>ldap.autoFollowReferrals -- a value of "true" indicates that LDAP referrals should be automatically followed. If this property is not set or is set to "false", the referral policy used is left up to to the provider. A referral is an entity that is used to redirect a client's request to another server. A referral contains the names and locations of other objects. It is sent by the server to indicate that the information that the client has requested can be found at another location (or locations), possibly at another server or several servers. <li>ldap.connectionPoolEnabled -- a value of "false" disables LDAP connection pooling. If this property is not set, the default value is "true". </ul> <p> Below is a sample config file section: </p> <pre> <jive> ... <ldap> <host></host> <port>389</port> <usernameField>uid</usernameField> <nameField>cn</nameField> <emailField>mail</emailField> <baseDN>ou=People;dc=example;dc=com</baseDN> <adminDN>cn=Directory Administrator</adminDN> <adminPassword></adminPassword> </ldap> <provider> <user> <className>org.jivesoftware.wildfire.ldap.LdapUserProvider</className> </user> <auth> <className>org.jivesoftware.wildfire.ldap.LdapAuthProvider</className> </auth> <group> <className>org.jivesoftware.wildfire.ldap.LdapGroupProvider</className> </group> </provider> ... </jive> </pre> <p>You'll most likely want to change which usernames are authorized to login to the admin console. By default, only the user with username "admin" is allowed to login. However, you may have different users in your LDAP directory that you'd like to be administrators. The list of authorized usernames is controlled via the <tt>admin.authorizedUsernames</tt> property. For example, to let the usersnames "joe" and "jane" login to the admin console:</p> <pre> <jive> ... <admin> ... <authorizedUsernames>joe, jane</authorizedUsernames> </admin> ... </jive> </pre> <p><a name=""><h2>Custom Search Filter</h2></a></p> <p>By default, Wildfire will load all objects under the baseDN that have the attribute specified by <tt>ldap.usernameField</tt>. In the case that the username field is set to "uid", the search for all users would be "(uid=*)". However, there are cases when this logic does not work -- for example, when a directory contains other objects besides users but all objects share "uid" as a unique identifier field. In that case, you may need to specify a custom search filter using <tt>ldap.searchFilter</tt>. As an example, a search filter for all users with a "uid" and a "cn" value of "joe" would be:</p> <pre>(&(uid={0})(cn=joe))</pre> <p>The "{0}" value in the filter above is a token that should be present in all custom search filters. It will be dynamically replaced with "*" when loading the list of all users or a username when loading a single user.</p> <p>Some custom search filters may include reserved XML entities such as "&". In that case, you must enter the search filter into the wildfire.xml file using CDATA: <pre><searchFilter><![CDATA[(&(sAMAccountName={0})(|(givenName=GEORGE)(givenName=admin)))]]></searchFilter></pre> <p><a name="ctxFactory"><h2>Custom Inital Context Factory</h2></a></p> <p> Some LDAP servers or application servers may require that a different LDAP initial context factory be used rather than the default (com.sun.jndi.ldap.LdapCtxFactory). You can set a custom initial context factory by adding the following to wildfire.xml: <pre> <ldap> ... other ldap settings here <initialContextFactory>com.foo.factoryClass</initialContextFactory> </ldap></pre> </p> <p><a name="connectionPool"><h2>Connection Pooling</h2></a></p> The default LDAP provider (Sun's) support pooling of connections to the LDAP server. Connection pooling can greatly improve performance, especially on systems with high load. Connection pooling is enabled by default, but can be disabled by setting the Jive property <tt>ldap.connectionPoolEnabled</tt> to <tt>false</tt>: <pre><ldap> ... other ldap settings here <connectionPoolEnabled>false</connectionPoolEnabled> </ldap></pre></p> <p> You should set several Java system properties to change default pool settings. For more information, see the following pages: <ul> <li><a href="http://java.sun.com/products/jndi/tutorial/ldap/connect/pool.html"> http://java.sun.com/products/jndi/tutorial/ldap/connect/pool.html</a> <li><a href="http://java.sun.com/products/jndi/tutorial/ldap/connect/config.html"> http://java.sun.com/products/jndi/tutorial/ldap/connect/config.html</a> </ul> </p> <p>Note that if you turn on LDAP debugging, connection pooling will not be enabled. If SSL LDAP mode is enabled, you must set a system property to enable pooling of SSL LDAP connections.</p> <p><a name="vcard"><h2>LDAP vCard Integration</h2></a></p> <p>The LDAP vCard provider will expose LDAP profile information as vCard data for XMPP clients that support the XMPP vCard extension. First, enable the provider:</p> <pre> <provider> ... <vcard> <className>org.jivesoftware.wildfire.ldap.LdapVCardProvider</className> </vcard> ... </provider> </pre> <p>Next, you must add mappings between LDAP fields and vCard fields in the wildfire.xml file. The vcard attributes are configured by adding an attrs="attr1,attr2" attribute to the vcard elements. Arbitrary text can be used for the element values as well as MessageFormat style placeholders for the ldap attributes. For example, if you wanted to map the LDAP attribute displayName to the vcard element FN, the XML snippet would be: <FN attrs="displayName">{0}</FN></p> <p>The vCard XML must be escaped in CDATA and must also be well formed. It is the exact XML this provider will send to a client after after stripping attr attributes and populating the placeholders with the data retrieved from LDAP. This system should be flexible enough to handle any client's vCard format. An example mapping follows.</p> <pre> <ldap> <vcard-mapping> <![CDATA[ <vCard xmlns='vcard-temp'> <FN attrs="displayName">{0}</FN> <NICKNAME attrs="uid">{0}</NICKNAME> <BDAY attrs="dob">{0}</BDAY> <ADR> <HOME/> <EXTADR>Ste 500</EXTADR> <STREET>317 SW Alder St</STREET> <LOCALITY>Portland</LOCALITY> <REGION>Oregon</REGION> <PCODE>97204</PCODE> <CTRY>USA</CTRY> </ADR> <TEL> <HOME/> <VOICE/> <NUMBER attrs="telephoneNumber">{0}</NUMBER> </TEL> <EMAIL> <INTERNET/> <USERID attrs="mail">{0}</USERID> </EMAIL> <TITLE attrs="title">{0}</TITLE> <ROLE attrs="">{0}</ROLE> <ORG> <ORGNAME attrs="o">{0}</ORGNAME> <ORGUNIT attrs="">{0}</ORGUNIT> </ORG> <URL attrs="labeledURI">{0}</URL> <DESC attrs="uidNumber,homeDirectory,loginShell"> uid: {0} home: {1} shell: {2} </DESC> </vCard> ]]> </vcard-mapping> </ldap> </pre> <h2>LDAP FAQ</h2> <p> <b>Can I create new users through Wildfire when using LDAP?</b> <ul>No, Wildfire treats LDAP directories as read-only. Therefore, it's not possible to create or edit users through the application.</ul> <b>Why is the list of usernames not sorted in the admin console when using LDAP?</b> <ul>Several popular LDAP servers such as OpenLDAP do not support server-side sorting of search results. On those servers, users will appear out of order. However, you can enable client-side sorting of search results by setting <tt>ldap.clientSideSorting</tt> to true in the XML configuration file.</ul> <b>I switched to LDAP and now cannot login to the admin console. What happened?</b> <ul>If you can no longer login to the admin console after switching, one of two things most likely happened:<ol> <li>By default, only the username "admin" is allowed to login to the admin console. Your directory may not contain a user with a username of "admin". In that case, you should modify the list of usernames authorized to login to the admin console (see above). <li>You may have set the baseDN to an incorrect value. The LDAP module recursively searches for users under the node in the directory specified by the baseDN. When the baseDN is incorrect, no users will be found. </ol> You can also enable debugging to get more information from the LDAP module. To do this, add <log><debug><enabled>true</enabled></debug></log> to your <tt>conf/wildfire.xml</tt> file. Log statements will be written to the <tt>logs/debug.log</tt> file. </ul> </div> </div> </body> </html>