Configuring the SimpleAuthenticator component

Figure 7. ActiveDirectoryConfig example using Simple Authenticator


ActiveDirectoryConfig example using Simple Authenticator

Figure 7 above shows an LdapV3ADUserService using the Simple Authenticator.

To configure the SimpleAuthenticator component

  1. With the station open in Workbench, expand the user service in the Nav tree and double-click on the ActiveDirectoryConfig node or LdapConfig node to access its property sheet.

    • If the authenticator is the “Kerberos Authenticator”, delete it (right-click it and select Delete).

    • If the authenticator is the “Simple Authenticator”, go to Step 5.

  2. Open the ldap palette, and expand the Authenticators folder.



  3. In the Nav tree, copy (drag and drop) the SimpleAuthenticator from the palette onto the station’s ActiveDirectoryConfig or LdapConfig component. Accept the default name in the popup Name dialog, or else enter another name, and click OK.

  4. Double-click the SimpleAuthenticator to configure its properties, as follows.



    • Connection User

      The user name for the initial connection. It may be required if the LDAP users logging in are in different sub-trees of the LDAP directory. If the LDAP server supports anonymous connections, this may not be required and can be left blank.

    • Connection Password

      Password for the user specified as the “Connection User” (if applicable).

    • Authentication Mechanism

      Specifies which SASL mechanism the station uses to authenticate to the server. Choices are:

      • simple — (default) Password is passed in clear text in authentication.

      • DIGEST-MD5 — Password is encrypted using Digest-MD5 mechanism.

      • CRAM-MD5 — Password is encrypted using CRAM-MD5 mechanism.

      • None — No authentication used.

      NoteIt is strongly recommended to use SSL when using simple authentication. Even though credentials in clear text will be used, at least it will be over an SSL connection.