BACK-END – IBM Directory (tab)
  • 08 Jan 2025
  • 2 Minutes à lire
  • Sombre
    Lumière
  • PDF

BACK-END – IBM Directory (tab)

  • Sombre
    Lumière
  • PDF

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

An IBM Security Directory Server record is required for OneSpan Authentication Server to forward authentication and accounting requests to a back-end IBM Security Directory Server.

Record changes (add, change, delete) will not take effect immediately on all OneSpan Authentication Server instances unless replication is used to synchronize the instances. If replication is not used, changes to records will take effect when each instance is restarted, once the change is available to it in its data store. Alternatively, if there is no restart, the record cache will refresh from the data store approximately every 15 minutes.

Table: BACK-END – IBM Directory tab
Field nameDescription
Enable SSLSpecifies whether to secure the connection to the back-end server using SSL.
LocationThe IP address of the back-end server.
Port

The port on which the back-end server receives and handles authentication requests.

Possible values: 065535

Timeout (seconds)

The number of seconds to wait for a response from the server before either retrying or trying another server.

Possible values: 1999

Search Base DN

The distinguished name (DN) where the search for user accounts starts.

Security Principal DN

The distinguished name (DN) of the user account used to access the back-end server and handle back-end authentication requests (security principal). The distinguished name must have permission to perform searches for users on the LDAP server. When a distinguished name is not supplied, the LDAP server must allow anonymous searches.

Security Principal Password

The password of the user account used to access the back-end server and handle back-end authentication requests (security principal).

User Object Class NameThe name of the user object class to search within.
User ID Attribute NameThe name of the user attribute name to search on.
Attribute Mapping
User Name Attribute NameThe LDAP attribute name to use as the user's display name. If user information synchronization is enabled, the user display name will be added to the user account during DUR user information synchronization.
Phone Attribute NameThe LDAP attribute name to use as the user's landline number. If user information synchronization is enabled, the user's landline number will be added to the user account during DUR user information synchronization.
Mobile Attribute NameThe LDAP attribute name to use as the user's mobile number. If user information synchronization is enabled, the user's mobile number will be added to the user account during DUR user information synchronization.
Email Attribute NameThe LDAP attribute name to use as the user's e-mail address. If user information synchronization is enabled, the user's e-mail address will be added to the user account during DUR user information synchronization.

If the timeout is either not configured or set too low for LDAP back-end records, the LDAP query may time out. This will result in the denial of the login request. To verify if this occurred, verify the trace file to look for LDAP timeout messages.


Cet article vous a-t-il été utile ?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle