Users Guide

Table Of Contents
NOTE: The user attributes should be configured in the LDAP system used to query before integrating on the
directory services.
NOTE: You need to enter the user attributes as cn or sAMAccountName for AD LDS configuration and UID for
LDAP configuration
d. In the Attribute of Group Membership box, enter the attribute that stores the groups and member information in the
directory.
e. Enter the network timeout and search timeout duration in seconds. The maximum timeout duration supported is 300
seconds.
f. To upload an SSL certificate, select Certificate Validation and click Select a file. The certificate should be a Root CA
Certificate encoded in Base64 format.
The Test connection button is enabled.
4. Click Test connection, and then enter the bind user credentials of the domain to be connected to.
NOTE: While testing the connection, ensure that the Test username is the value of the Attribute of User Login
entered previously.
5. Click Test connection.
In the Directory Service Information dialog box, a message is displayed to indicate successful connection.
6. Click Ok.
7. Click Finish.
A job is created and run to add the requested directory in the Directory Services list.
1. In the DIRECTORY NAME column, select the directory. The Directory Service properties are displayed in the right pane.
2. Click Edit.
3. In the Connect to Directory Service dialog box, edit the data and click Finish. The data is updated and saved.
Delete Directory services
Select the check box corresponding to the Directory Services to be deleted, and then click Delete.
Related references
Disable OpenManage Enterprise users on page 146
Enable OpenManage Enterprise users on page 146
Related information
Managing OpenManage Enterprise appliance settings on page 140
Manage OpenManage Enterprise users on page 141
OpenManage Enterprise login using OpenID Connect
providers
You can log in using OpenID Connect (OIDC) providers. OpenID Connect providers are the identity and user management
software that allow users to securely access applications. Currently, OpenManage Enterprise provides support for PingFederate
and Keycloak.
WARNING:
User roles and scopes are reset to 'default' on client re-registration with OIDC provider
PingFederate (PingIdentity). This issue might lead to resetting of the privileges and scope of non-admin roles
(DM and Viewer) to that of the Administrator. Re-registration of the appliance console with OIDC provider is
triggered in the event of an appliance upgrade, change in network configuration, or change in SSL certificate.
To avoid security concerns post any of the above-mentioned re-registration events, the administrator must
reconfigure all the OpenManage Enterprise Client IDs on the PingFederate site. Also, it is highly recommended
that Client IDs are created only for Administrator users with Pingfederate till this issue is resolved.
Managing OpenManage Enterprise appliance settings 151