{"id":1173,"date":"2014-09-16T14:30:15","date_gmt":"2014-09-16T14:30:15","guid":{"rendered":"http:\/\/evolphin.com\/help\/?p=1173"},"modified":"2020-05-18T10:36:04","modified_gmt":"2020-05-18T14:36:04","slug":"ldap","status":"publish","type":"post","link":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/","title":{"rendered":"Configuring LDAP"},"content":{"rendered":"\n<p>For many organizations, LDAP Server is a key way to allow their users to log into multiple systems. Evolphin Zoom has native support to integrate with your LDAP Server, including popular Directory Services, like Microsoft Active Directory and Novell Directory Service. The following instructions provide you with information on how to fetch the desired subset of existing users, groups, and other associations from your LDAP Server into Zoom.<\/p>\n\n\n\n<p>Make sure that Directory Service is installed and configured on your LDAP Server. If using, then SSL is also enabled and configured on your LDAP Server. Admin access to your LDAP Server should be available.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prepping your LDAP Server<\/h2>\n\n\n\n<p>Before moving user information to Zoom, you need to identify what should be copied to Zoom. Identify:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Users that should be copied to Zoom.<\/li><li>If any roles should be created in Zoom. Also, which of these roles should be mapped to some, all, or none of these users.<\/li><li>If any projects (existing in Zoom) should be assigned to some or all of these users.<\/li><\/ul>\n\n\n\n<p>Firstly, locate the <strong><span style=\"text-decoration: underline;\">users<\/span><\/strong> for pulling into Zoom. All of these users should belong to one common group that will be called the <span class=\"keyword\">Zoom Filter group<\/span>. Any user with an email, that also belongs to this Zoom Filter group, will be copied to Zoom.<\/p>\n\n\n\n<p>Additionally, you can also identify <strong><span style=\"text-decoration: underline;\">other groups<\/span><\/strong> that will map as roles in Zoom. These other groups should also be a member of the Zoom Filter group. Each user that should automatically get one or more of these roles in Zoom should be mapped correspondingly to one or more of these other groups on the LDAP Server as well. Roles may also have no users mapped to them.<\/p>\n\n\n\n<p>Lastly, you can also check which <strong><span style=\"text-decoration: underline;\">Projects in Zoom<\/span><\/strong> you would want to automatically assign to one or more of these users. Each user that should automatically be assigned one or more projects in Zoom should have the same project names set in their Project attribute on the LDAP Server as well.<\/p>\n\n\n\n<p>On your LDAP Server, make sure to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Configure one group as the Zoom Filter Group containing all users that you wish to copy to Zoom.\n<ul>\n<li>These users&#8217; mail attributes should be filled in.<\/li>\n<\/ul>\n<\/li><li>Optionally, configure additional groups that are also members of the Zoom Filter Group.\n<ul>\n<li>Additionally, each of these users may also be assigned to zero or more of these groups.<\/li>\n<\/ul>\n<\/li><li>Optionally, these users also have their Project attribute filled in. The project name is case-sensitive and the project should also already exist in Zoom.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Zoom Filter Group<\/h4>\n\n\n\n<p>In order to pull users &amp; groups from the LDAP Server into Zoom, a filter group must be created in the LDAP Server&#8217;s database first. For example, <code class=\"\">CN=ZOOM_DAM_USERS, OU=Enterprise Apps,&nbsp;DC=corp,DC=acme,DC=com<\/code> in the diagram below:<\/p>\n\n\n\n<figure class=\"wp-block-image alignnone wp-image-3051 size-full\"><img decoding=\"async\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_5544177af3d2d.png\" alt=\"\" class=\"wp-image-3051\"\/><figcaption>Sample LDAP\/AD container hierarchy<\/figcaption><\/figure>\n\n\n\n<p>In addition, it is recommended to create Security Groups in the LDAP Server for the permissions that Zoom support, these permissions must be applied to the groups after these have been pulled into Zoom:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Permission<\/strong><\/td><td><strong>Effect<\/strong><\/td><\/tr><tr><td>None<\/td><td>Has no access to any resource<\/td><\/tr><tr><td>Distribute<\/td><td>Can read only published project items<\/td><\/tr><tr><td>Review<\/td><td>Inherits Distribute permission and can read those project items that have been marked for review<\/td><\/tr><tr><td>Read<\/td><td>Inherits Review permission and can read\/view any resource<\/td><\/tr><tr><td>Contribute<\/td><td>Inherits Read permission and can add new items<\/td><\/tr><tr><td>Edit<\/td><td>Inherits Contribute Permission and can delete their own items<\/td><\/tr><tr><td>Edit_All<\/td><td>Inherits Edit Permission and can delete all items<\/td><\/tr><tr><td>Administer<\/td><td>Inherits Edit_All Permission and can change project configuration<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"warning\">\n<p>Any user or group in the LDAP Server must be a member of the Zoom filter group in order to be pulled into Zoom. That implies that you need to add users to both the Zoom filter group as well as the groups you will be pulling. If you failed to add users to the groups you wish to pull, the groups will be empty in Zoom after import.<\/p>\n<p>Also, the &#8220;mail&#8221; attribute needs to be set for each user you wish to pull into Zoom. If the &#8220;mail&#8221; attribute is missing the user will not be pulled into Zoom.<\/p>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What will be read from the LDAP Server?<\/h2>\n\n\n\n<p>At the minimum, all users that have emails configured and are assigned to the Zoom Filter group will be read and pulled into Zoom. Additionally:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If these users also belong to other groups that are members of the Zoom Filter group, then these groups will be created as Roles and automatically mapped to these users in Zoom. The roles will be created under the masterldap role that already exists in Zoom.<\/li><li>From Zoom 7.5 onwards, if these users also have a Project attribute assigned on the LDAP Server and these projects already exist in Zoom (case-sensitive), then these Projects are also automatically assigned to these users in Zoom. If the Project attribute has a Project name that does not exist in Zoom, then it is skipped.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>On the LDAP Server<\/strong><\/td><td><strong>First-time pull in Zoom<\/strong><\/td><td><strong>Subsequent pull in Zoom<\/strong><\/td><\/tr><tr><td><strong>Users<\/strong> belong to the <strong>Zoom Filter group<\/strong>.<\/td><td><strong>Users<\/strong> are <strong>created<\/strong> and <strong>mapped<\/strong> to <strong>masterldap role<\/strong>.\n<p>&nbsp;<\/p>\n<p>Zoom <strong>admins<\/strong> will need to <strong>update roles<\/strong> and <strong>assign projects<\/strong> for these users.<\/p>\n<\/td><td><strong>Users<\/strong> are <strong>added or removed<\/strong> from Zoom as per their membership in the Zoom Filter group on the LDAP Server.<\/td><\/tr><tr><td><strong>Users<\/strong> belong to the <strong>Zoom Filter group<\/strong>.\n<p>&nbsp;<\/p>\n<p><strong>Other groups<\/strong> are also <strong>members of the Zoom Filter group<\/strong>.<\/p>\n<p><strong>Some users<\/strong> belonging to the Zoom Filter group also belong to <strong>some of these other groups<\/strong>.<\/p>\n<\/td><td><strong>Users<\/strong> are <strong>created<\/strong>. <strong>Roles<\/strong> are <strong>created under the masterldap role<\/strong> from the groups on the LDAP Server. (Only groups that are members of the Zoom Filter group)\n<p>&nbsp;<\/p>\n<p>Users <strong>assigned<\/strong> to their <strong>corresponding role<\/strong> as per the group they belonged to. If a user <strong>only belonged to the Zoom Filter group<\/strong>, she will be <strong>assigned the masterldap role<\/strong>. If the other group has no users, then the corresponding role in Zoom will have no user assigned to it.<\/p>\n<p>These newly-created <strong>roles<\/strong> will have <strong>permission set to None<\/strong> and will be <strong>assigned all projects<\/strong>.<\/p>\n<p>Zoom <strong>admins<\/strong> will still need to <strong>assign projects<\/strong> for these users.<\/p>\n<\/td><td><strong>Users<\/strong> are <strong>added or removed<\/strong> from Zoom as per their membership in the Zoom Filter group on the LDAP Server.\n<p>&nbsp;<\/p>\n<p><strong>Roles<\/strong> are <strong>added or removed<\/strong> from Zoom as per the membership of groups in the Zoom Filter group on the LDAP Server.<\/p>\n<\/td><\/tr><tr><td><strong>Users<\/strong> belong to the <strong>Zoom Filter group<\/strong>.\n<p>&nbsp;<\/p>\n<p><strong>Some users<\/strong> have <strong>Projects<\/strong> assigned to them (with names that also exist in Zoom)<\/p>\n<\/td><td><strong>Users<\/strong> are <strong>created<\/strong>, <strong>mapped to masterldap role<\/strong>, and <strong>projects assigned<\/strong> as read from the LDAP Server. (Project names are case-sensitive and should exist on Zoom)\n<p>&nbsp;<\/p>\n<p>Zoom <strong>admins<\/strong> will need to <strong>update roles<\/strong> for these users and <strong>assign projects<\/strong> for users that <strong>didn&#8217;t have Project attribute set<\/strong> on the LDAP Server.<\/p>\n<\/td><td><strong>Users<\/strong> are <strong>added or removed<\/strong> from Zoom as per their membership in the Zoom Filter group on the LDAP Server.\n<p>&nbsp;<\/p>\n<p><strong>New projects<\/strong> are <strong>associated<\/strong> with users when added on the LDAP Server. But, projects are <strong>never unassigned<\/strong> from the Zoom user when removed from the user on the LDAP Server.<\/p>\n<\/td><\/tr><tr><td><strong>Users<\/strong> belong to the <strong>Zoom Filter group<\/strong>.\n<p>&nbsp;<\/p>\n<p><strong>Some users<\/strong> have <strong>Projects<\/strong> assigned to them (with names that also exist in Zoom)<\/p>\n<p><strong>Other groups<\/strong> are also <strong>members of the Zoom Filter group<\/strong>.<\/p>\n<p><strong>Some users<\/strong> belonging to the Zoom Filter group also belong to <strong>some of these other groups<\/strong>.<\/p>\n<\/td><td><strong>Users<\/strong> are <strong>created<\/strong> and <strong>projects assigned<\/strong> as read from LDAP Server. (Project names are case-sensitive). <strong>Roles<\/strong> are <strong>created under the masterldap role<\/strong> from the groups on the LDAP Server. (Only groups that are members of the Zoom Filter group)\n<p>&nbsp;<\/p>\n<p>Users <strong>assigned to their corresponding role<\/strong> as per the group they belonged to. If a user <strong>only belonged to the Zoom Filter group<\/strong>, it will be <strong>assigned the masterldap role<\/strong>. If the other group has no users, then the corresponding role in Zoom will have no user assigned to it.<\/p>\n<p>These newly-created <strong>roles<\/strong> will have <strong>permission set to None<\/strong> and will be <strong>assigned all projects<\/strong>.<\/p>\n<p>Zoom <strong>admins<\/strong> will still need to <strong>assign projects<\/strong> for users that <strong>didn&#8217;t have Project attribute set<\/strong> on the LDAP Server.<\/p>\n<\/td><td><strong>Users<\/strong> are <strong>added or removed<\/strong> from Zoom as per their membership in the Zoom Filter group on the LDAP Server.\n<p>&nbsp;<\/p>\n<p><strong>Roles<\/strong> are <strong>added or removed<\/strong> from Zoom as per the membership of groups in the Zoom Filter group on the LDAP Server.<\/p>\n<p><strong>New projects<\/strong> are <strong>associated<\/strong> with users when added on the LDAP Server. But, projects are <strong>never unassigned<\/strong> from the Zoom user when removed from the user on the LDAP Server.<\/p>\n<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Setting up LDAP without SSL<\/h2>\n\n\n\n<p>To configure LDAP in Zoom, you need to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Save LDAP settings<\/li><li>Update to LDAP Realm<\/li><li>Pull users from LDAP Server<\/li><\/ul>\n\n\n\n<p>Follow the sections below to see the steps:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Saving LDAP Settings<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>In your preferred web browser, <strong>open<\/strong> the <span class=\"keyword\">Web Management Console<\/span>.<\/li><li><span class=\"command\">Log in<\/span> using your Zoom <span class=\"keyword\">admin<\/span> credentials.<\/li><li>In the left sidebar, <span class=\"command\">click<\/span> <span class=\"keyword\">Server Control Panel<\/span><strong>\u00a0<\/strong>under the\u00a0<span class=\"keyword\">Server<\/span>\u00a0section.<\/li><li><span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">LDAP Server Settings<\/span>. <figure><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/02\/img_5e466c723bf18.png\"><img loading=\"lazy\" decoding=\"async\" width=\"835\" height=\"472\" class=\"alignnone wp-image-13957 size-large\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/02\/img_5e466c723bf18-1024x579.png\" alt=\"\"><\/a><\/figure><p id=\"RbuwzOJ\"><\/li><li><span class=\"command\">Fill in<\/span> the following values to meet your organization&#8217;s needs:<br> <table style=\"height: 270px; border: 1px solid black;\" width=\"662\"> <tbody> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Field<\/strong><\/td> <td style=\"border: 1px solid black;\"><strong>Description<\/strong><\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Host<\/strong><\/td> <td style=\"border: 1px solid black;\">The machine IP\/Hostname where LDAP Server is running<\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Port<\/strong><\/td> <td style=\"border: 1px solid black;\">Port number where the LDAP Server is listening. <em>Default 389<\/em><\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Use SSL<\/strong><\/td> <td style=\"border: 1px solid black;\">See section &#8220;<em>Setting Up LDAP (with SSL)<\/em>&#8220;<\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Base DN<\/strong><\/td> <td style=\"border: 1px solid black;\">The distinguished name of the base context in the LDAP repository within which the users and groups defined; this will act as the base container from which any lookup\/search will execute. If you have thousands of users in LDAP, please create an appropriate container to limit the search scope. Note: If you have multiple OU organizational units that you are referring to for your users, your base DN needs to encapsulate both OUs.<em>Ex. CN=Users,DC=ZOOM,DC=local<\/em><\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Username Attribute<\/strong><\/td> <td style=\"border: 1px solid black;\">The attribute that would mark the username.<em>Ex. sAMAccountName<\/em><\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Groupname Attribute<\/strong><\/td> <td style=\"border: 1px solid black;\">The name of the attribute that would mark the name of the group: typically, cn for any group entry. <em>Ex. CN<\/em><\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>LDAP Searching Username<\/strong><\/td> <td style=\"border: 1px solid black;\">The DN of the user name entity that will be used to bind to the LDAP Server. This username must be a member of a group with enough privileges to be able to search the LDAP db.<em>Ex. ZOOM\\Administrator or CN=Administrator,CN=Users,DC=ZOOM,DC=local<\/em><\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>LDAP Searching Password<\/strong><\/td> <td style=\"border: 1px solid black;\">The password associated with the searching username.<\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Exclude Users<\/strong><\/td> <td style=\"border: 1px solid black;\">A comma-separated list of user DNs to ignore<\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Exclude Groups<\/strong><\/td> <td style=\"border: 1px solid black;\">A comma-separated list of group DNs to ignore<\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>Filter Group<\/strong><\/td> <td style=\"border: 1px solid black;\">The DN of a group that will contain all users who would operate with Zoom, and also all the groups that the users are organized into.<em>Ex.\u00a0CN=ZOOM_DAM_USERS, OU=Enterprise Apps, DC=corp,DC=acme,DC=com in the diagram\u00a0above.<\/em><\/td> <\/tr> <tr style=\"border: 1px solid black;\"> <td style=\"border: 1px solid black;\"><strong>\u00a0Follow Referrals*<\/strong><\/td> <td style=\"border: 1px solid black;\">Enable this when using multiple LDAP Servers.<\/td> <\/tr> <tr> <td style=\"border: 1px solid black;\"><strong>Encode URLs*<\/strong><\/td> <td style=\"border: 1px solid black;\">Enable this if spaces or special characters are used in the user names, organizational units, or groups.<\/td> <\/tr> <tr> <td style=\"border: 1px solid black;\"><strong>Auto Pull Frequency<sup>\u2020<\/sup><\/strong><\/td> <td style=\"border: 1px solid black;\">Specify the number (in days) for the frequency at which information will be pulled again from the LDAP Server. This will get information about any change in users\/projects\/roles.<\/td> <\/tr> <\/tbody> <\/table><div>* Available from Zoom 7.5 onwards.<\/div><sup style=\"font-weight: inherit;\">\u2020<\/sup><span style=\"font-size: 1rem; font-weight: inherit;\"> Available from Zoom 7.3 onwards.<\/span><\/li><li><span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">Save<\/span>. Settings should look similar to sample settings below: <figure><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/02\/img_5e466ca559633.png\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"462\" class=\"alignnone wp-image-13958 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/02\/img_5e466ca559633.png\" alt=\"\"><\/a><\/figure><p id=\"fnXykqV\"><\/li><li>You will be prompted to restart the server. <span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">Yes<\/span><strong>.<\/strong><\/li><\/ol>\n\n\n\n<p>LDAP Settings are saved in Zoom.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Updating to LDAP Realm<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>In your preferred web browser, <strong>open<\/strong> the <span class=\"keyword\">Web Management Console<\/span>.<\/li><li><span class=\"command\">Log in<\/span> using your Zoom <span class=\"keyword\">admin<\/span> credentials.<\/li><li>In the<span class=\"keyword\"> left sidebar<\/span>, click Server Control Panel, then click Security Settings and verify the security realm is switched to ExtLdapRealm, if not change it to :<br>ExtLdapRealm. This will switch the authentication provider to LDAP from the local Zoom user database. <div class=\"warning\">This is an irreversible switch, please make sure you really want to do this before switching.<\/div> <figure><img decoding=\"async\" class=\"alignnone size-full wp-image-3058 \" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_55441c41d95c3.png\" alt=\"\"><\/figure><p id=\"sofNZvL\"><\/li><\/ol>\n\n\n\n<p>The Realm is now updated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pulling users from your LDAP Server<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>In your preferred web browser, <strong>open<\/strong> the <span class=\"keyword\">Web Management Console<\/span>.<\/li><li><span class=\"command\">Log in<\/span> using your Zoom <span class=\"keyword\">admin<\/span> credentials.<\/li><li>In the <span class=\"keyword\">left sidebar<\/span>, <span class=\"command\">click<\/span>\u00a0<span class=\"keyword\">Manage accounts<\/span>\u00a0under\u00a0<span class=\"keyword\">User Accounts<\/span><em><em>.<\/em><\/em> <figure><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/02\/img_5e4679b563206.png\"><img loading=\"lazy\" decoding=\"async\" width=\"835\" height=\"472\" class=\"alignnone wp-image-13961 size-large\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/02\/img_5e4679b563206-1024x579.png\" alt=\"\"><\/a><\/figure><p id=\"wmPcbru\"> <\/li><li><span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">Pull Users and Roles From LDAP Server<\/span><strong>.<\/strong>If successful, you should see a list of the names in your Security Group listed in the manage accounts and the following dialog: <figure><img loading=\"lazy\" decoding=\"async\" width=\"544\" height=\"119\" src=\"http:\/\/www.evolphin.com\/images\/support\/installation_guide\/LDAP_Confirmation.png\" alt=\"\"><\/figure><\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Setting Up LDAP with SSL<\/h2>\n\n\n\n<p>The following sections describe how to configure the specific items to allow LDAP to authenticate over SSL using Microsoft Active Directory. These instructions assume that the base configurations were applied in section, <em><a href=\"#setting-up-ldap-without-ssl\">Setting Up LDAP without SSL<\/a>.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exporting Certificate from Active Directory<\/h3>\n\n\n\n<p><span style=\"text-decoration: underline;\"><em>Windows 2012<\/em><\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><span class=\"command\">Log into<\/span> your <span class=\"keyword\">Active Directory<\/span> server using <span class=\"keyword\">Administrator<\/span> credentials.<\/li><li>Search for&nbsp;certsrv.msc<br><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/certsrv_msc.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2312 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/certsrv_msc.png\" alt=\"certsrv_msc\" width=\"600\" height=\"375\"><\/a><\/li><li><span class=\"command\">Click<\/span>&nbsp;<span class=\"keyword\">Enter<\/span>&nbsp;on your keyboard.<\/li><li><span class=\"command\">Select<\/span> <span class=\"keyword\">Certification Authority<\/span> in the left sidebar, <span class=\"command\">right-click<\/span> and <span class=\"command\">select<\/span>&nbsp;<span class=\"keyword\">Properties<\/span>.<\/li><li><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_selectProperties.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2313 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_selectProperties.png\" alt=\"SSL_selectProperties\" width=\"597\" height=\"414\"><\/a><\/li><li><span class=\"command\">Select<\/span> the&nbsp;<span class=\"keyword\">Details<\/span>&nbsp;tab.<br><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_clickDetails.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2314 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_clickDetails.png\" alt=\"SSL_clickDetails\" width=\"498\" height=\"617\"><\/a><\/li><li><span class=\"command\">Click<\/span> the&nbsp;<span class=\"keyword\">Copy to file&#8230;&nbsp;<\/span>button.<br><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2315 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile.png\" alt=\"SSL_copyToFile\" width=\"492\" height=\"614\"><\/a><\/li><li><span class=\"command\">Click<\/span>&nbsp;<span class=\"keyword\">Next<\/span>.<br><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg01.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2316 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg01.png\" alt=\"SSL_copyToFile_Dlg01\" width=\"494\" height=\"475\"><\/a><\/li><li><span class=\"command\">Select<\/span>&nbsp;<span class=\"keyword\">Base-64 encoded X.509 (.CER)<\/span>&nbsp;and <span class=\"command\">click<\/span>&nbsp;<span class=\"keyword\">Next<\/span>.<br><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg02.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2317 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg02.png\" alt=\"SSL_copyToFile_Dlg02\" width=\"495\" height=\"477\"><\/a><\/li><li><span class=\"command\">Click<\/span>&nbsp;<span class=\"keyword\">Browse&#8230;<\/span>&nbsp;and <span class=\"command\">select<\/span> your desired location to export the certificate file to. Then <span class=\"command\">click<\/span>&nbsp;<span class=\"keyword\">Next<\/span>.<br><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2318 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg03.png\" alt=\"SSL_copyToFile_Dlg03\" width=\"497\" height=\"479\"><\/a><\/li><li><span class=\"command\">Click<\/span>&nbsp;<span class=\"keyword\">Finish<\/span>.<br><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg04.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2319 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_copyToFile_Dlg04.png\" alt=\"SSL_copyToFile_Dlg04\" width=\"500\" height=\"483\"><\/a><\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Importing Certificate from Active Directory<\/h3>\n\n\n\n<p>In order for Zoom to properly connect to Active Directory using SSL, it will need to import the certificate into its Keystore. The following instructions describe how to import the Active Directory certificate into the Java JRE.<\/p>\n\n\n\n<p>NOTE: You need the Java keytool.exe installed on the machine. If it is not installed with your Evolphin JRE, install a different JRE on your computer. You may need to set your absolute path in order to run the keytool.exe command.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">Start<\/span>\u00a0menu.<\/li><li><span class=\"command\">Search<\/span> for\u00a0<span class=\"keyword\">cmd<\/span><strong>.<\/strong><\/li><li><span class=\"command\">Right-click<\/span> on\u00a0<span class=\"keyword\">Command Prompt<\/span>.<\/li><li><span class=\"command\">Select<\/span>\u00a0<span class=\"keyword\">Run as Administrator<\/span><strong>.<br><\/strong><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_runAsAdministrator.png\"><img loading=\"lazy\" decoding=\"async\" width=\"194\" height=\"186\" class=\"alignnone size-full wp-image-2320\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/SSL_runAsAdministrator.png\" alt=\"SSL_runAsAdministrator\"><\/a><\/li><li><span class=\"command\">Type<\/span> into <span class=\"keyword\">Command Prompt<\/span>: <div class=\"code\"><code> cd \"C:\\Program Files (x86)\\Evolphin\\DAM\\jre\\lib\\security\" <\/code><\/div><\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\"><li><span class=\"command\">Hit<\/span> <span class=\"keyword\">Enter<\/span>.<\/li><li><span class=\"command\">Type<\/span> into the <span class=\"keyword\">Command Prompt<\/span>: <div class=\"code\"><code>keytool -import -alias adcert -file\u00a0&lt;INSERT PATH TO CERTIFICATE>\u00a0-keystore\u00a0cacerts<\/code><span style=\"font-family: -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen-Sans, Ubuntu, Cantarell, &quot;Helvetica Neue&quot;, sans-serif; font-size: 1rem; font-weight: inherit;\"> <\/span><\/div><div class=\"note\"><span style=\"font-size: 1rem; font-weight: inherit;\">Make sure that your path is in quotation marks to escape the spaces in the path.<\/span> <p>The <em>cacerts<\/em> is relative to where you are in the command line, so if you are not in the security folder, you can put an absolute path here.<\/p><span style=\"font-size: 1rem; font-weight: inherit;\">The keytool application is not packaged along with the Zoom server. You can find it in any regular JRE installation.<\/span><\/div><\/li><li>You will be prompted to <span class=\"command\">enter<\/span> the <span class=\"keyword\">keystore password<\/span>. <div class=\"note\">By default, the password is changeit.<\/div><\/li><li><span class=\"command\">Hit<\/span> <span class=\"keyword\">Enter<\/span>.<\/li><li>You will be prompted whether you want to trust this certificate. <span class=\"command\">Hit<\/span> <span class=\"keyword\">Yes<\/span>.<\/li><li><span class=\"command\">Hit<\/span> <span class=\"keyword\">Enter<\/span>.<\/li><\/ol>\n\n\n\n<p>Your certificate should now have been installed correctly.<\/p>\n\n\n\n<p>Move to the next section to enable SSL for LDAP connections in Zoom.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configuring SSL for LDAP in Zoom<\/h3>\n\n\n\n<p>These instructions have been truncated for SSL specific settings. For other settings, please refer to&nbsp;<a href=\"#setting-up-ldap-without-ssl\"><em>Setting Up LDAP without SSL<\/em><\/a><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In your preferred web browser, <strong>open<\/strong> the <span class=\"keyword\">Web Management Console<\/span>. <div class=\"note\">ex. http:\/\/localhost:8443 or <span class=\"keyword\">http:\/\/&lt;zoomserver>:8443<\/span><span style=\"font-size: 1rem; font-weight: inherit;\"> <\/span><\/div><\/li><li><span class=\"command\">Log in<\/span> using your admin credentials.<\/li><li>In the left sidebar, <span class=\"command\">click<\/span>\u00a0<span class=\"keyword\">Server Control Panel<\/span>\u00a0under the\u00a0<span class=\"keyword\">Server<\/span>\u00a0section.<\/li><li><span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">LDAP Server Settings<\/span>.<\/li><li>Under <span class=\"keyword\">LDAP Port<\/span>, <span class=\"command\">type<\/span>\u00a0<span class=\"keyword\">636<\/span>. <div class=\"note\">636 is the default SSL port for LDAP<\/div><\/li><li><span class=\"command\">Check<\/span> the box\u00a0<span class=\"keyword\">Use SSL<\/span>.<\/li><li><span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">Save<\/span>.<\/li><li>You will be prompted to restart the server. <span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">Yes<\/span><strong>.<\/strong><\/li><li><span class=\"command\">Refresh<\/span> your web browser.<\/li><li><span class=\"command\">Log in<\/span> using your admin credentials.<\/li><li>In the left sidebar, <span class=\"command\">click<\/span>\u00a0<span class=\"keyword\">Manage accounts<\/span>\u00a0under\u00a0<span class=\"keyword\">User Accounts<\/span><em>.<\/em><\/li><li><span class=\"command\">Click<\/span>\u00a0<span class=\"keyword\">Pull Users and Roles From LDAP Server<\/span><strong>.<\/strong>If successful, you should see a list of the names in your Security Group listed in the manage accounts and the following dialog: <figure><a href=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/LDAP_Confirmation.png\"><img loading=\"lazy\" decoding=\"async\" width=\"544\" height=\"119\" class=\"alignnone wp-image-2311 size-full\" src=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2014\/09\/LDAP_Confirmation.png\" alt=\"LDAP_Confirmation\"><\/a><\/figure> <\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>For many organizations, LDAP Server is a key way to allow their users to log into multiple systems. Evolphin Zoom has native support to integrate with your LDAP Server, including popular Directory Services, like Microsoft Active Directory and Novell Directory Service. The following instructions provide you with information on how to fetch the desired subset [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[170],"tags":[21],"class_list":["post-1173","post","type-post","status-publish","format-standard","hentry","category-ldap","tag-zoom-5"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Configuring LDAP - Evolphin Documentation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuring LDAP - Evolphin Documentation\" \/>\n<meta property=\"og:description\" content=\"For many organizations, LDAP Server is a key way to allow their users to log into multiple systems. Evolphin Zoom has native support to integrate with your LDAP Server, including popular Directory Services, like Microsoft Active Directory and Novell Directory Service. The following instructions provide you with information on how to fetch the desired subset [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/\" \/>\n<meta property=\"og:site_name\" content=\"Evolphin Documentation\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-16T14:30:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-18T14:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_5544177af3d2d.png\" \/>\n<meta name=\"author\" content=\"Rahul Bhargava\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rahul Bhargava\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/\"},\"author\":{\"name\":\"Rahul Bhargava\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#\\\/schema\\\/person\\\/e5f3dc53ac5f026ed258e224e75447f7\"},\"headline\":\"Configuring LDAP\",\"datePublished\":\"2014-09-16T14:30:15+00:00\",\"dateModified\":\"2020-05-18T14:36:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/\"},\"wordCount\":2526,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evolphin.com\\\/help\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/img_5544177af3d2d.png\",\"keywords\":[\"zoom 5\"],\"articleSection\":[\"LDAP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/\",\"url\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/\",\"name\":\"Configuring LDAP - Evolphin Documentation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evolphin.com\\\/help\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/img_5544177af3d2d.png\",\"datePublished\":\"2014-09-16T14:30:15+00:00\",\"dateModified\":\"2020-05-18T14:36:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#primaryimage\",\"url\":\"https:\\\/\\\/evolphin.com\\\/help\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/img_5544177af3d2d.png\",\"contentUrl\":\"https:\\\/\\\/evolphin.com\\\/help\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/img_5544177af3d2d.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/administration-server\\\/ldap\\\/ldap\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/evolphin.com\\\/help\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configuring LDAP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#website\",\"url\":\"https:\\\/\\\/evolphin.com\\\/help\\\/\",\"name\":\"Evolphin Documentation\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/evolphin.com\\\/help\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#organization\",\"name\":\"Evolphin Documentation\",\"url\":\"https:\\\/\\\/evolphin.com\\\/help\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/evolphin.com\\\/help\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/cropped-evolphin-logo-dolphin_sm.png\",\"contentUrl\":\"https:\\\/\\\/evolphin.com\\\/help\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/cropped-evolphin-logo-dolphin_sm.png\",\"width\":200,\"height\":200,\"caption\":\"Evolphin Documentation\"},\"image\":{\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/evolphin.com\\\/help\\\/#\\\/schema\\\/person\\\/e5f3dc53ac5f026ed258e224e75447f7\",\"name\":\"Rahul Bhargava\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/952acf4ec94a228ca32ed9b65cee4cc97a33509ea04500e768b71da346e58971?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/952acf4ec94a228ca32ed9b65cee4cc97a33509ea04500e768b71da346e58971?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/952acf4ec94a228ca32ed9b65cee4cc97a33509ea04500e768b71da346e58971?s=96&d=mm&r=g\",\"caption\":\"Rahul Bhargava\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Configuring LDAP - Evolphin Documentation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/","og_locale":"en_US","og_type":"article","og_title":"Configuring LDAP - Evolphin Documentation","og_description":"For many organizations, LDAP Server is a key way to allow their users to log into multiple systems. Evolphin Zoom has native support to integrate with your LDAP Server, including popular Directory Services, like Microsoft Active Directory and Novell Directory Service. The following instructions provide you with information on how to fetch the desired subset [&hellip;]","og_url":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/","og_site_name":"Evolphin Documentation","article_published_time":"2014-09-16T14:30:15+00:00","article_modified_time":"2020-05-18T14:36:04+00:00","og_image":[{"url":"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_5544177af3d2d.png","type":"","width":"","height":""}],"author":"Rahul Bhargava","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rahul Bhargava","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#article","isPartOf":{"@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/"},"author":{"name":"Rahul Bhargava","@id":"https:\/\/evolphin.com\/help\/#\/schema\/person\/e5f3dc53ac5f026ed258e224e75447f7"},"headline":"Configuring LDAP","datePublished":"2014-09-16T14:30:15+00:00","dateModified":"2020-05-18T14:36:04+00:00","mainEntityOfPage":{"@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/"},"wordCount":2526,"commentCount":0,"publisher":{"@id":"https:\/\/evolphin.com\/help\/#organization"},"image":{"@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#primaryimage"},"thumbnailUrl":"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_5544177af3d2d.png","keywords":["zoom 5"],"articleSection":["LDAP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/","url":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/","name":"Configuring LDAP - Evolphin Documentation","isPartOf":{"@id":"https:\/\/evolphin.com\/help\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#primaryimage"},"image":{"@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#primaryimage"},"thumbnailUrl":"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_5544177af3d2d.png","datePublished":"2014-09-16T14:30:15+00:00","dateModified":"2020-05-18T14:36:04+00:00","breadcrumb":{"@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#primaryimage","url":"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_5544177af3d2d.png","contentUrl":"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2015\/05\/img_5544177af3d2d.png"},{"@type":"BreadcrumbList","@id":"https:\/\/evolphin.com\/help\/administration-server\/ldap\/ldap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/evolphin.com\/help\/"},{"@type":"ListItem","position":2,"name":"Configuring LDAP"}]},{"@type":"WebSite","@id":"https:\/\/evolphin.com\/help\/#website","url":"https:\/\/evolphin.com\/help\/","name":"Evolphin Documentation","description":"","publisher":{"@id":"https:\/\/evolphin.com\/help\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evolphin.com\/help\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evolphin.com\/help\/#organization","name":"Evolphin Documentation","url":"https:\/\/evolphin.com\/help\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evolphin.com\/help\/#\/schema\/logo\/image\/","url":"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/04\/cropped-evolphin-logo-dolphin_sm.png","contentUrl":"https:\/\/evolphin.com\/help\/wp-content\/uploads\/2020\/04\/cropped-evolphin-logo-dolphin_sm.png","width":200,"height":200,"caption":"Evolphin Documentation"},"image":{"@id":"https:\/\/evolphin.com\/help\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/evolphin.com\/help\/#\/schema\/person\/e5f3dc53ac5f026ed258e224e75447f7","name":"Rahul Bhargava","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/952acf4ec94a228ca32ed9b65cee4cc97a33509ea04500e768b71da346e58971?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/952acf4ec94a228ca32ed9b65cee4cc97a33509ea04500e768b71da346e58971?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/952acf4ec94a228ca32ed9b65cee4cc97a33509ea04500e768b71da346e58971?s=96&d=mm&r=g","caption":"Rahul Bhargava"}}]}},"_links":{"self":[{"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/posts\/1173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/comments?post=1173"}],"version-history":[{"count":3,"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/posts\/1173\/revisions"}],"predecessor-version":[{"id":14839,"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/posts\/1173\/revisions\/14839"}],"wp:attachment":[{"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/media?parent=1173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/categories?post=1173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evolphin.com\/help\/wp-json\/wp\/v2\/tags?post=1173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}