Digi IX40 User Manual page 758

Table of Contents

Advertisement

User authentication
1. Select the device in Remote Manager and click Actions > Open Console, or log into the IX40
local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to access the Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. (Optional) Prevent other authentication methods from being used if LDAP authentication fails.
Other authentication methods will only be used if the LDAP server is unavailable.
(config)> auth ldap authoritative true
(config)>
4. Set the type of TLS connection used by the LDAP server:
(config)> auth ldap tls value
(config)>
where value is one of:
n
off: Uses a non-secure TCP connection on the LDAP standard port, 389.
n
on: Uses an SSL/TLS encrypted connection on port 636.
n
start_tls: Makes a non-secure TCP connection to the LDAP server on port 389, then
sends a request to upgrade the connection to a secure TLS connection. This is the
preferred method for LDAP.
The default is off.
5. If tls is set to on or start_tls, configure whether to verify the server certificate:
(config)> auth ldap verify_server_cert value
(config)>
where value is either:
n
true: Verifies the server certificate with a known Certificate Authority.
n
false: Does not verify the certificate. Use this option if the server is using a self-signed
certificate.
The default is true.
6. Set the distinguished name (DN) that is used to bind to the LDAP server and search for users.
Leave this option unset if the server allows anonymous connections.
(config)> auth ldap bind_dn dn_value
(config)>
For example:
(config)> auth ldap bind_dn cn=user,dc=example,dc=com
(config)>
IX40 User Guide
LDAP
758

Advertisement

Table of Contents
loading

Table of Contents