To configure custom authentication via an LDAP server following the steps below.
1. Stop the EASA Server service.
2. Add one property to the file below and Save.
3. Configure LDAP as an EASA Administrator.
UserName:CN=//Administrator//,OU=//Users//,DC=//easa//,DC=//com// Password=//enter_password// connectionURL=//%%ldap://192.168.0.111%%// connectionQueryPort=//389// userBase=CN=//Users//,DC=//easa//,DC=//com// userSearch=//easa_user_name// (enter the actual EASA login)
4. Enable a Java LDAP class.
5. Enable the LDAP username as a valid login.
The Base DN that is configurable on the LDAP tab in the userBase parameter will allow all users in the specified Base DN access to EASA when ' create.user=true '. See details below.
The 'auth.properties' file above contains several key parameters to control the behavior of the authentication.
If you have issues, you’ll need to login to EASA with the default Authenticator.
1. Stop the EASA Server.
2. Modify a file.
EASA should now accept the default username and password.