Applies To:
Show VersionsBIG-IQ Centralized Management
- 6.1.0
LDAP User Authentication
Use my LDAP server to authenticate BIG-IQ users
F5 BIG-IQ Centralized Management supports encrypted connections to your company's LDAP server (LDAP server versions 2 and 3, OpenLDAP directory, and Apache Directory Server) using one of these methods, with certificate validation:
-
StartTLS - (with server certificate validation enabled) This is the recommended and most secure method.
-
LDAPS - Typically used for connections to older servers, such as those running LDAPv2.
After you set up BIG-IQ to use your LDAP server, you can add users and user groups that authenticated by the LDAP server.
Before integrating BIG-IQ with your LDAP server for authentication
Before integrating LDAP server authentication with the F5 BIG-IQ Centralized Management system, you must gather the following information.
Required information | Notes |
---|---|
Host name of the LDAP server |
For the SSL server certificate validation to succeed, you must use a FQDN. For example: ldap.example.com The FQDN must match the FQDN in the CN (Common Name) attribute of the subject of the X509 certificate for the LDAP server. For example, an LDAP server might present a certificate that includes the following subject data: Subject: C=US, ST=Washington, L=Seattle, O=ldap1, OU=F5 Networks, CN=ldap.example.com/emailAddress=ldap@example.com If the value of the host name does not match the FQDN in the CN field, authentication will fail. Specifying an IP address instead of a FQDN results in such a mismatch. |
Port of the LDAP server | The default port is 389 for StartTLS and 636 for LDAPS, unless otherwise specified. If your LDAP server uses an alternate, non-standard port, you need to specify it in the authentication settings. |
LDAP server's SSL certificate |
For the BIG-IQ to trust the SSL certificate presented by your LDAP server, you must provide a PEM-formatted certificate in the authentication provider settings. To establish the SSL connection to the LDAP server, the BIG-IQ must trust any one of the SSL certificates in the chain presented by the server during the SSL handshake. As an alternative to the LDAP server's SSL certificate, you can use the issuing CA’s SSL certificate instead. A typical scenario where the issuing CA’s certificate is used instead, is when a domain controller uses multiple servers, each with a different certificate. In this case, all the certificates would have the same issuing CA, often the company’s own CA. |
Root Distinguished Name |
This is the Root DN for your directory. The BIG-IQ uses it as the starting point in the directory when it searches for users and groups. |
LDAP users |
You'll need to create BIG-IQ users and groups that map to the remote users and groups on the LDAP server.
Important:
Use an LDAP browser to review the users and groups in your
directory's structure and determine where they are located in the
organizational units (OUs). Then, decide how you want to map those names to
your BIG-IQ users and groups. User access to certain BIG-IQ screens and features is dependent on the BIG-IQ roles you associate to the user. You can also manage user access based on the roles associated to the groups the user belongs to on your LDAP server. To authenticate a user against the remote LDAP server, choose one of the following options:
|
LDAP groups |
While not needed for user authentication if a User Bind Template is provided, a Bind User Distinguished Name must be provided to be able to search for groups. However, it is not necessary for either login or group search if your LDAP server allows anonymous binds (insecure option, not recommended). If your company does not allow dedicated bind accounts, any directory user with permissions to search the directory for groups can be used to bind instead. |
Set up BIG-IQ to use your LDAP server for user authentication and authorization
You can configure BIG-IQ to use one or more of your company's LDAP servers to authenticate and authorize users. Some fields are pre-populated with values that work well for most LDAP servers with standard configurations and schemas. Feel free to change these default values if your LDAP schema is different.
Add a BIG-IQ user authenticated by my LDAP server and associate it with a role
For the LDAP-authenticated user to access BIG-IQ, you must put the local user in a BIG-IQ role, or put in a role in a local group mapped to one of the user’s groups on the LDAP server.
Create an LDAP authenticated user group
Create a user group to offer individual users the same privileges on F5 BIG-IQ Centralized Management. This user group will be authorized by your LDAP server.