Skip to main content

Directory configuration

This section describes the configuration of the company directory.

An administrator account must be set up to perform the following actions:

  • user search
  • user recovery
  • authentication
  • etc.

Directory type

To configure access to the company directory, you need to identify the type of access required:

  • simple: Simple LDAP such as Apache Directory Server or OpenLDAP
  • ad: Microsoft Active Directory
  • ad-ds: Microsoft ADLDS

Directory definition by scope

This section covers the configuration of a scope-specific directory. This is the most flexible configuration mode.

Directory configuration is accessible from the administration interface in the Identities > Directory section, and is stored as a document in the LDAPConfiguration class in FlowerDocs.


The information to be configured is as follows:

IdentifierDisplay nameDescription
LDAPTypeLDAP typeDirectory type
URLURLDirectory access url
UserUserUser to connect to the directory
PasswordPasswordPassword for directory user
BaseDNBase DNDN configured in the directory
IdAttributeAttribute for identifierDirectory attribute used to store the user identifier
GroupIdAttributeAttribute for group identifierDirectory attribute used to store the group identifier
DisplayNameAttributeDisplay name attributeDirectory attribute used to store the user's display name
SearchAttributeSearch attributeDirectory attribute used to search for users/groups
MembersAttributeMembersDirectory attribute used to store group members
EnableLowerCaseOfUserNameEnable evaluation of lower case identifierEnables you to force the resolution of user identifiers in lower case

Default directory definition

This section covers the configuration of a default directory for a FlowerDocs instance.

This section is not necessary if the directory is configured via the scope-based administration interface described above. The directory type can then be defined by WEB application:

  • For FlowerDocs GUI using the property: gui.ldap.type
  • For FlowerDocs Core using the property: ws.ldap.type

Example: Configuring an embedded server

gui.ldap.type=ad
ws.ldap.type=simple

To configure access to the LDAP directory, you need to set the ldap property.

PropertyDefault valueDescription
ldap.bind.urlDirectory address
ldap.bind.rootBase node in LDAP structure
ldap.base.dnUser search database

An admnistrator account must be set up.

PropertyDescription
ldap.bind.dnUser's Distinguished Name
ldap.bind.passwordUser's password

In order to retrieve (or authenticate) users with the configured directory, you must also define:

PropertyDescription
ldap.attr.idAttribute used to retrieve a user's identifier

Examples:

  • Microsoft Active Directory : sAMAcountName
  • Microsoft Active Directory LDS: uid
  • Apache Directory Server: uid

Other attributes used for user mapping can be defined:

PropertyDescription
ldap.attr.display.nameAttribute used to retrieve a user's identifier
ldap.attr.passwordAttribute used to retrieve a user's password
ldap.attr.searchAttribute used for research

Configuration examples

ADLDS

ldap.bind.url=ldap://ldap.company.com:389
ldap.bind.root=dc=arondor,dc=dev
ldap.bind.dn=CN=fadmin,OU=Demo,OU=FlowerDocs,DC=arondor,DC=dev
ldap.bind.password=okidoki
ldap.base.dn=OU=Demo,OU=FlowerDocs
ldap.attr.id=CN
ldap.attr.display.name=displayName

OpenLDAP

OpenLDAP requires that the base DN used

ldap.bind.url=ldap://ldap.company.com:389
ldap.bind.root=
ldap.base.dn=dc=arondor,dc=dev
ldap.attr.id=CN
ldap.bind.dn=CN=admin,DC=arondor,DC=dev
ldap.bind.password=okidoki
ldap.attr.display.name=displayName

Directory administration

From the administration interface, users can be created with a default password. For this, the password is not mandatory, but is a global parameter for the FlowerDocs instance.

PropertyDescription
ldap.default.passwordDefault password if none set at creation
ldap.user.password.mandatoryBoolean defining if the password field is mandatory

Users and groups can only be created at the root of the directory access node.

Example: For Microsoft Active Directory: &lt;domaine&gt;/<base DN>