Configuring the DashBoard URM
The Configure DashBoard URM tab enables you to select whether the database is an embedded server where user information is managed in DashBoard Server’s LDAP, or to link the database to an external or corporate LDAP directory. The default is an embedded service, where an Administrator manages DashBoard Server user accounts, roles, and permissions using the options in the Configure User Rights dialog. This section outlines how to configure both types.
Configuring for an Embedded LDAP Server
By default, the DashBoard Server and URM is configured to operate as an isolated system where the DashBoard URM service maintains its own database for user information and permissions. Therefore no additional set up is required to use this type of system unless you wish to re-name your server. The server name displays in the Basic Tree View of the DashBoard clients on your network, and the tabs in the Configure User Rights dialog.
To re-name your server:
1.
Display the DashBoard Server tab in the DashBoard client.
2.
3.
Click Apply.
Configuring for an External LDAP Server
This section outlines how to configure your DashBoard URM service to retrieve user data and permissions from an external LDAP Server. The Configure URM menu is a web-interface usable within the DashBoard client.
Important — It is highly recommended to use an Embedded LDAP Server.
To configure the permissions database:
1.
Navigate to the Configure DashBoard URM tab as follows:
Right-click the DashBoard URM node in the Basic Tree View.
Select Open to display the tab in the Device View of the DashBoard client.
2.
Locate the Permissions Management header.
3.
4.
Select No from the Run Embedded LDAP Server. The DashBoard URM will apply the same permissions for users as defined by the external LDAP Server.
5.
LDAP Host/IP — Enter the host name, or IP address, for the external LDAP Server host that will be used to determine user permissions.
Bind DN — Enter the LDAP Distinguished Name of LDAP User that can be used to read/modify the information on the LDAP Server.
Bind Password — Enter the corresponding password for the username entered in the Bind DN field.
LDAP Port — Enter the port on which the external LDAP Server is listening. The default is 389.
6.
Click Apply to save your changes.
To configure the user accounts and roles database:
1.
Navigate to the Configure DashBoard URM tab as follows:
Right-click the DashBoard URM node in the Basic Tree View.
Select Open to display the tab in the Device View of the DashBoard client.
2.
Locate the User Management header.
3.
Select No from the Let URM Manage Users.
4.
User ID Domain — All user IDs are required to be in the form of an E-mail address using the domain name (without the @ symbol). The User ID Domain field enables you to create a default suffix for the E-mail address that is automatically added to the User ID field of the Login dialog.
LDAP Host/IP — Enter the host name, or IP address, for the external LDAP Server host.
Bind DN — Enter the LDAP Distinguished Name of LDAP User that can be used to read the information on the LDAP Server.
Bind Password — Enter the corresponding password for the username entered in the Bind DN field.
LDAP Port — Enter the port on which the external LDAP Server is listening. The default is 389.
5.
Base User DN — Enter the root node for the list of users in the external LDAP.
Object Class — Enter the attribute that defines the object class for user data.
User ID Attribute — Enter the attribute that the external LDAP filter uses as a user ID.
Full Name Attribute — Enter the attribute that the external LDAP filter uses to specify a user’s full name.
Email Address Attribute — Enter the attribute that the external LDAP filter uses to specify a user’s E-mail address.
6.
Base Group DN — Enter the root node for all of the roles (groups) in the LDAP server.
Object Class — Enter the attribute that defines the object class for groups.
Group ID Attribute — Enter the attribute that the external LDAP filter uses as a group ID.
Group Name Attribute — Enter the attribute that the external LDAP filter uses to specify a group’s full name.
7.
Click Apply to save your changes.