Set up Active Directory authentication to allow users to log in to SEM with their Active Directory (AD) credentials.
Before you begin, gather the following:
To get directory server details, open a Windows command prompt on a computer on the correct network and type nslookup.
User access in SEM is based on Active Directory group membership.
Create at least one security group called ROLE_LEM_ADMINISTRATORS. Group names must be identical to the names given below, otherwise users cannot log in to the SEM console. SolarWinds recommends creating SEM group names using capital letters to help you quickly identify SEM groups in Active Directory.
You can add up to six of the following SEM custom groups:
LEM_ALERTS_ONLY permissions correspond with the monitor user role.
Learn more about SEM roles here.
The ROLE_LEM_CONTACTS group is only used for email notification in rules. Users added to this group do not have login rights.
In SEM 2020.4 and newer versions, you can create multiple LDAP configurations.
If any LDAP configurations have already been created these are displayed.
The Create LDAP Configuration dialog is displayed.
Enter the required information.
See the table below.
Field Description Configuration Name Enter a friendly name of your choosing for the LDAP configuration. IP or HostnameEnter the IP address or host name of your LDAP server.
Domain Enter the fully-qualified domain name for the account store.Directory Service Server User Name
Use the format account_name@example.com.
SolarWinds recommends using a Directory Service account to prevent integration issues if the software license expires. The user name does not require special privileges (such as Domain Admin) to be a Directory Service user.
Directory Service Server Password Enter the password for the user account. Use SSL Encryption(Optional) Select to use the transport layer security protocol (LDAPS) for a secure connection. This option directs traffic from the SEM VM to a designated server (usually a domain controller) for use with the Directory Service tool.
LDAP PortIf SSL encryption is not used, the default for this setting is 389. If SSL encryption is used, the default for the port is 636.
Use for Authentication Select, then click Next if you wish to use Advanced Settings shown below. Domain Aliases (Optional) Specify any Domain Alias names that should be authenticated using this LDAP configuration. (The role/group names configured on this page will also apply.) NetBIOS Names (Optional) Specify any NetBIOS names that should be authenticated using this LDAP configuration. (The role/group names configured on this page will also apply.) Admin Group (Optional) Specify the DS group in Active Directory to use for the SEM administrator role. If you do not specify a name, the default ROLE_LEM_ADMINISTRATORS group is used. Alerts Only Group (Optional) Specify the DS group in Active Directory to use for the SEM auditor role. If you do not specify a name, the default ROLE_LEM_AUDITOR group is used. Guest Group (Optional) Specify the DS group in Active Directory to use for the SEM guest role. If you do not specify a name, the default ROLE_LEM_GUESTS group is used. Notify Only Group (Optional) Specify the DS group in Active Directory to use for the SEM notifications role. If you do not specify a name, the default ROLE_LEM_CONTACTS group is used. Reports Group (Optional) Specify the DS group in Active Directory to use for the SEM reports role. If you do not specify a name, the default ROLE_LEM_REPORTS group is used.Configurations are enabled as soon as they are created.
Use the toggles to disable or enable individual LDAP configurations.
A warning message displays if you disable a configuration informing you that users will be unable to log on from that domain and any logged-in users from that domain will be immediately logged out.
Click Edit to display the Configure LDAP details for this configuration (which can now be edited and saved).
Click Delete to remove this configuration.
To grant a user access to SEM, add the user to the appropriate role (security group) in Active Directory.
SEM does not support nested Active Directory groups.
Link nội dung: https://itt.edu.vn/index.php/sem-xet-a1681.html