Homepage | About EASA | Contact
Once EASA 5.3 has been installed on an EASA Server, the LDAP custom authentication process can be configured through the LDAP server. The steps below detail the stages of enabling LDAP in EASA.
Menu.properties
file located at \EasaServerData\admin\config
easa.server.menu1 = com.easa.custom.auth.ldap.LDAPMenu
UserName:CN=Administrator,OU=Users,DC=easa,DC=com Password=<Corporate Password> connectionURL=ldap://192.168.0.111 connectionQueryPort=389 userBase=CN=Users,DC=easa,DC=com userSearch=sAMAccountName (the value will be your EASA's username)
Authentication.properties
file located at \EasaServerData\admin\config
AuthenticationClass = backend.DefaultAuthenticator
#AuthenticationClass = com.easa.custom.auth.ldap.LDAPAttributeAuthenticator
auth.properties
file located at \EasaServerData\admin\config
admin.user = admin
replace 'admin' with your username. create.user = false
replace 'false' with 'true'.
Note: The Base DN that is configurable on the LDAP tab in the userBase parameter will allow all users in the specified Base DN access to EASA when create.user
is set to True
. See details below.
The auth.properties
file as mentioned above contains several key parameters to control the behaviour of the authentication:
If you have issues, you’ll need to login to EASA with the backend Authenticator. Stop the EASA server and reopen the Authentication.properties file. Uncomment the
AuthenticationClass = backend.DefaultAuthenticator
line by removing the hashtag (#) character and comment out
AuthenticationClass = com.easa.custom.auth.ldap.LDAPAttributeAuthenticator
line by adding a hashtag (#) character as the first character.
You should then be able to login to EASA with the default username and password.