Installation guide

11
LDAP
If LDAP authentication is to be used, it is recommended to leave at least one SecurityCenter administrator
account and one manager account for each organization in SecurityCenter set to use TNS authentication in
the event that the LDAP services becomes unreachable.
LDAP configuration settings enable SecurityCenter to utilize any LDAP server for authentication purposes. This enhances
the security of SecurityCenter by facilitating “single sign-on” and password complexity requirements in environments
where mandated by security policy. After clicking the “LDAP” tab, a page similar to the one below is displayed.
Fill out the LDAP configuration settings as provided by the LDAP server administrator and click “Test LDAP Settings” to
confirm the validity of the settings.
This table provides a detailed breakdown of the available LDAP parameters:
Table 1 LDAP Directory Information
Description
Authentication
This selection indicates if Transport Layer Security (TLS) or LDAP over SSL (LDAPS)
is used for communication with the LDAP server.
If the LDAP server requires credentials to search for user data, then the “Username”
and “Password” fields are required. By default, if an Active Directory server is used for
LDAP queries, it requires an authenticated search. Enter the username within this
field in the “email” style format (user@domain.com).
If the LDAP server requires credentials to search for user data, then the “Username”
and “Password” fields are required. By default, many LDAP servers require an
authenticated search.