OpenEdge domains in LDAP configurations
- Last Updated: August 18, 2021
- 1 minute read
- OpenEdge
- Version 12.2
- Documentation
Spring Security LDAP configuration details will almost always be unique to each individual enterprise; however, the following will give you information about configuring OpenEdge domains in the directory service so that the OEClientPrincipalFilter bean can find and use them.
Each LDAP directory service has a schema that defines its objects and object attributes. Different implementations of a directory service may vary in the objects and object attributes it supports. Examples of different directory services are:
- Apache Directory Service
- Windows Active Directory
- OpenLDAP
An OpenEdge domain will be just another LDAP group object that contains a list of the user accounts (Distinguished Names) who are members of that group, and who are entitled to the access associated with the group. The difference is that the LDAP group’s name will be based on the name pattern you defined in the previous sections.
For example, directory service administrators use the LDAP groupofUniqueNames objects as user account roles, where
each group member’s user account is in a uniqueMember
attribute. The directory service’s hierarchical object space might look like the
following:
|
In this simple example, the user account acmeuser1 is in the domain acme. This
occurs because a group is defined with the name OED:acme, and the user account for acmeuser1 is a member of that group. Therefore, when Spring Security
authenticates acmeuser1, it will see that acmeuser1 is a member in the ROLE_OED:acme. The role supplies the domain name acme for creating a client-principal’s domain-name field.
For more information about LDAP, see LDAP user accounts