Applies To:
Show VersionsBIG-IQ Centralized Management
- 6.1.0
Active Directory User Authentication
Use my Active Directory Domain Controller to authenticate BIG-IQ users
- StartTLS - (with server certificate validation enabled) This is the recommended and most secure method.
- LDAPS - Typically used for connections to older servers, such as those running LDAPv2
After you set up BIG-IQ to use your Active Directory as an authentication provider, you can create local users and user groups mapped to the corresponding ones on your domain controller.
Before integrating BIG-IQ with your Active Directory Domain Controller for authentication
Before integrating Active Directory Domain Controller (DC) authentication with the F5 BIG-IQ Centralized Management system, you must gather the following information.
Required information | Notes |
---|---|
Fully Qualified Domain Name (FQDN) of the Active Directory DC |
For the SSL server certificate validation to succeed, you must use a FQDN. For example: activedirectory.example.com. The FQDN must match the FQDN in the CN (Common Name) attribute of the subject of the X509 certificate for the authentication server. For example, the server might present a certificate that includes the following subject data: Subject: C=US, ST=Washington, L=Seattle, O=activedir1, OU=F5 Networks, CN=activedirectory.example.com/emailAddress=activedirectory@example.com If the value of the host name does not match the FQDN in the CN field, authentication will fail. Specifying an IP address instead of a FQDN results in such a mismatch. |
Port of the Active Directory DC | The default port is 389 for StartTLS and 636 for LDAPS, unless otherwise specified. If your Active Directory DC uses an alternate (non-standard port), you need to specify it in the authentication provider settings. |
Active Directory DC's SSL certificate |
For the BIG-IQ to trust the SSL certificate presented by your Active Directory DC, you must provide a PEM-formatted certificate in the authentication provider settings. To establish the SSL connection to the Active Directory server, the BIG-IQ must trust any one of the SSL certificates in the chain presented by the server during the SSL handshake. As an alternative to the Active Directory DC's SSL certificate, you can use the issuing CA’s SSL certificate instead. A typical scenario where the issuing CA’s certificate is used instead, is when a domain controller uses multiple servers, each with a different certificate. In this case, all the certificates would have the same issuing CA, often the company’s own CA. |
Root Distinguished Name |
This is the Root DN for your directory. The BIG-IQ uses it as the starting point in the directory when it searches for users and groups. |
Active Directory users |
You'll need to create BIG-IQ users and groups that map to the remote users on the Active Directory DC.
Important:
User access to certain BIG-IQ screens and features is dependent on the BIG-IQ roles you associate to the user. You can also manage user access based on the roles associated to the groups the user belongs to on your Active Directory server. To manage access for a user authenticated against the remote Active Directory, choose one of the following options:
|
Active Directory groups |
The Bind User is not required for authentication, but must be provided to search for groups. The bind name is obtained by replacing the {username} token in the User Bind Template with the Bind User. If your company does not allow dedicated bind accounts, any directory user with permissions to search the directory for groups can be used to bind instead. |
Set up BIG-IQ to use Active Directory for user authentication and authorization
Add a BIG-IQ user authenticated by my Active Directory and associate it with a role
Before you add a user authenticated against your Active Directory Domain Controller, you must have your Active Director DC settings configured on BIG-IQ.
For the Active Directory-authenticated user to access BIG-IQ, you must put the local user in a BIG-IQ role, or put in a role a local group mapped to one of the user’s groups on the Active Directory Domain Controller.