Checking The Ldap Server Connection Status - Cisco TelePresence Administrator's Manual

Video communication server
Hide thumbs Also See for TelePresence:
Table of Contents

Advertisement

User accounts
Field
Description
Bind
Username of the account that the VCS will use to log
username
in to the LDAP server (case sensitive).
Only required if SASL is enabled.
Directory
configuration: this section specifies the base distinguished names to use when searching for account
and group names.
Base DN for
The ou= and dc= definition of the Distinguished
accounts
Name where a search for user accounts should start
in the database structure (case insensitive).
It is important to specify the DN in the order ou=,
then dc=
Base DN for
The ou= and dc= definition of the Distinguished
groups
Name where a search for groups should start in the
database structure (case insensitive).
It is important to specify the DN in the order ou=,
then dc=

Checking the LDAP server connection status

The status of the connection to LDAP server is displayed at the bottom of the page.
State = Active
No error messages are displayed.
State = Failed
The following error messages may be displayed:
Error message
DNS unable to do reverse lookup
DNS unable to resolve LDAP server
address
Failed to connect to LDAP server.
Check server address and port
Failed to setup TLS connection. Check
your CA certificate
Failure connecting to server. Returned
code<return code>
Invalid Base DN for accounts
Cisco VCS Administrator Guide (X8.1.1)
Configuring remote account authentication using LDAP
Reason / resolution
Reverse DNS lookup is required for SASL authentication.
Check that a valid DNS server is configured, and check the spelling of
the LDAP server address.
Check that the LDAP server details are correct.
CA certificate, private key and server certificate are required for TLS.
Other non-specific problem.
Check Base DN for accounts; the current value does not describe a
valid part of the LDAP directory.
Usage tips
Configure this to be the
sAMAccountName; Security Access
Manager Account Name (in AD this is the
account's user logon name).
This is for authentication of both
administrator login and user login
requests.
The Base DN for accounts and groups
must be at or below the dc level (include
all dc= values and ou= values if
necessary). LDAP authentication does
not look into sub dc accounts, only lower
ou= and cn= levels.
This is for authorization of an
authenticated user to log in as an
administrator or to log in to a user
account.
If no Base DN for groups is specified,
then the Base DN for accounts will be
used for both groups and accounts.
Page 267 of 507

Advertisement

Table of Contents
loading

This manual is also suitable for:

Telepresence x8.1.1

Table of Contents