This page last changed on Jun 09, 2009 by ukuhnhardt.
The LDAP server connection is specified by manually editing the file atlassian-user.xml. Confluence 2.3 onwards supports multiple LDAP servers by repeating the instructions below for each server so that there are multiple repositories defined.
Stage 1 - Determine if you are migrating from os_user or atlassian_user
Check your current .../confluence/WEB-INF/classes/atlassian-user.xml file. If your os user tag is active, you're using os user in some fashion. Make sure to run the user migration after doing your LDAP details, as described in Migrating to new User Management.
Stage 2 - Configure Connection Details
- Edit the file .../confluence/WEB-INF/classes/atlassian-user.xml and configure the connection for either AD or LDAP.
- If your Active Directory Server allows anonymous searches, then you do not need to specify a securityPrincipal and securityCredential at all. For an example of how you would configure Confluence to allow anonymous authentication, see Enable Anonymous Authentication in LDAP or Active Directory
- To connect to LDAP over SSL, see Connect to LDAP via SSL
- Check your configuration against the example connection details shown below.
 | If you change your ldap key to a different name, you will need to change the cache name to pick it up. This is described in CONFKB181536872. |
<ldap key="ldapRepository" name="LDAP Repository@hecate.atlassian.com" cache="true">
<host>hecate.atlassian.com</host>
<port>389</port>
<securityPrincipal>cn=admin,dc=atlassian,dc=private</securityPrincipal>
<securityCredential>secret</securityCredential>
<securityProtocol>plain</securityProtocol>
<securityAuthentication>simple</securityAuthentication>
<baseContext>dc=atlassian,dc=private</baseContext>
....
Stage 3 - Map LDAP Data Tree
- Configuring the mappings in atlassian-user.xml for either AD or LDAP.
- Check your configuration against the example connection details shown below.
...
<baseUserNamespace>dc=staff,dc=perftest,dc=atlassian,dc=private</baseUserNamespace>
<baseGroupNamespace>dc=groups,dc=perftest,dc=atlassian,dc=private</baseGroupNamespace>
<usernameAttribute>cn</usernameAttribute>
<userSearchFilter>(objectClass=inetorgperson)</userSearchFilter>
<firstnameAttribute>givenname</firstnameAttribute>
<surnameAttribute>sn</surnameAttribute>
<emailAttribute>mail</emailAttribute>
<groupnameAttribute>cn</groupnameAttribute>
<groupSearchFilter>(objectClass=groupOfNames)</groupSearchFilter>
<membershipAttribute>member</membershipAttribute>
</ldap>
Stage 4 - Directory Search Depth Settings
These are the default settings:
...
<userSearchAllDepths>false</userSearchAllDepths>
<groupSearchAllDepths>false</groupSearchAllDepths>
The above settings configure the search depth on users and groups. If you set either attribute to:
- false - Confluence will search only for users/groups directly defined in <baseUserNamespace> and <baseGroupNamespace>.
- true - Confluence will search for users/groups defined in the above namespaces and also in namespaces nested within them. For example, if your users are distributed across multiple namespaces, you should set this option to true.
Setting the value to true may have a high cost in performance for large directories, because Confluence will search the whole tree and not just the immediate namespace.
Stage 5 - Optional LDAP Settings
The following settings are the default values for all the options under <ldap> in the atlassian-user.xml file. Some of them do not appear in the file normally, but can be added if you need to customise them:
XML tag |
Default value |
Description |
LDAP connection properties |
|
|
securityProtocol |
plain ssl |
Allow encrypted (SSL) connections. Can be omitted if anonymous access is available. |
authentication |
simple |
Plain-text password transmission. Can be 'none' if anonymous access to the LDAP server is available. |
initialContextFactory |
com.sun.jndi.ldap.LdapCtxFactory |
Class name of LDAP provider (default: Sun JNDI) |
batchSize |
100 |
Size of pages in search results |
poolingOn |
true |
Use connection pooling |
connectTimeout |
30000 |
Timeout in milliseconds when opening new server connections. Default: 30 seconds. |
readTimeout |
60000 |
Timeout in milliseconds for search and other read operations. Default: 60 seconds. |
LDAP connection pool properties |
|
|
initSize |
1 |
Initial size of connection pool, e.g. number of connections to open at start-up. [1] |
prefSize |
10 |
Preferred size of connection pool. [1] |
maxSize |
0 |
Maximum size of connection pool. Zero means no maximum size. [1] |
timeout |
300000 |
Idle time in milliseconds for a connection before it is removed from the pool. Default: 5 minutes. [1] |
debugLevel |
none |
Debug level for logging. [1] |
poolAuthentication |
simple |
Authentication for pool connections. [1] |
LDAP search properties |
|
|
timeToLive |
0 |
Time limit on searches in milliseconds. Zero means no limit. [2] |
userSearchAllDepths |
false |
Whether user searches should search through the LDAP tree or only for direct children of the DN specified by the userSearchFilter. [3] |
groupSearchAllDepths |
false |
Whether group searches should search through the LDAP tree or only for direct children of the DN specified by the groupSearchFilter. [3] |
useUnqualifiedUsernameForMembershipComparison |
false |
If set to true, Confluence will use the value of the usernameAttribute on the user to check for group membership comparisons instead of the complete distinguished name. |
Notes
- The connection pool properties provided by Atlassian-User correspond with the connection pooling properties in JNDI. See this documentation for further information.
- More information on this time limit is available on Sun's JNDI tutorial.
- The "searchAllDepths" parameters toggle between SearchControls.SUBTREE_SCOPE (true) and SearchControls.ONELEVEL_SCOPE (false). See Sun's JNDI tutorial on scope configuration for more information.
To override the default values listed above, you can add the value inside your <ldap> tag after the rest of your configuration:
<ldap ...>
...
<groupnameAttribute>cn</groupnameAttribute>
<groupSearchFilter>(objectClass=groupOfNames)</groupSearchFilter>
<membershipAttribute>member</membershipAttribute>
<initSize>20</initSize> <!-- bigger initial connection pool! -->
</ldap>
Stage 6 - Optional: Configure LDAP for User Authentication Only
If you'd like to configure LDAP for user management and authentication only, start by configuring LDAP integration with groups then follow the instructions for authentication-only LDAP to disable the group management functionality.
Optional: Configuring Multiple LDAP Repositories
For some LDAP servers, it might be necessary to configure Confluence to connect to multiple LDAP servers. This functionality is available in Confluence 2.3 and above, and has a separate guide: Configuring multiple LDAP repositories.
RELATED TOPICS
Add LDAP Integration
Configuring multiple LDAP repositories
atlassian-user.xml reference
How to write a LDAP search filter, in the Atlassian Development space.
|