Import LDAP Device Groups
An efficient method of creating an LDAP device group is to import an LDAP group from a remote LDAP server. To complete an import, you are required to use the built-in capam LDAP Browser, which gets launched during the import procedure.
An efficient method of creating an LDAP device group is to import an LDAP group from a remote LDAP server. To complete an import, you are required to use the built-in
LDAP Browser, which gets launched during the import procedure.
This topic explains the following tasks:
Privileged Access Manageradministrator has privileges to import an LDAP group.
Launch the LDAP Browser
Use the LDAP Browser to import an LDAP group.
Follow these steps:
- Verify that your appliance is licensed. A license is required to launch the LDAP Browser.
- Navigate toConfiguration,3rd Party, LDAPto configure access to an LDAP server.Provisioning the LDAP server is necessary to make LDAP groups available for import.
- SelectDevices,Manage Device Groups.
- SelectImport LDAP Groups.The LDAP Browser launches. You are prompted to select an LDAP domain.
- Go to the next procedure to import the LDAP group.
If the LDAP server does not support the cipher suite that is used by the
Privileged Access ManagerLDAP browser, a connection failure occurs. The following error message appears:
“Possible cipher mismatch with LDAP server.”
During provisioning, ensure that the ciphers that are supported on the target LDAP server include those ciphers that are supported by the LDAP browser.
Cipher Suites Supported by the LDAP Browser
The LDAP browser supports newer cipher suites including Diffie-Hellman cipher suites that enable Perfect Forward Secrecy (PFS) and better performance through the elliptical curve.
- (Default) When TLSv1.0 and 1.1 are allowed, the following ciphers are available for negotiation with the LDAP/Active Directory server:
- When TLSv1.0 and 1.1 are disabled (only TLSv1.2 is enabled), the following ciphers are available:
When you change the TLS configuration, the current LDAP browser connections are not affected. The configuration changes take effect after the LDAP browser is launched.
- When FIPS mode is enabled, the following ciphers are available:
When TLS 1.0 and 1.1 are disallowed in the
Privileged Access Managerconfiguration, SHA-1 HMAC is disallowed and only SHA256 is used.
The only Supported Elliptic curves are -secp256r1, secp384r1. These curves are NIST approved. Microsoft Windows can set curve support by group policy to ensure that the Active Directory Server allows
Privileged Access Managercurves if ECDHE is required.
Import LDAP Groups
In the LDAP Browser, the
Exploretab in the left pane shows a graphical representation of an LDAP tree. Select any object to see the object attributes.
Follow these steps:
- Select the LDAP domain and select OK to connect to it.The browser connects and displays all records below that domain.
- Navigate the LDAP tree in the left pane and locate the device group that you want to import. Traverse the tree in any order or direction.
- To import a device group to import, select the checkbox next to the group.
- Repeat these steps for each group you want to import.
- (Optional) Review the device groups that are selected for import:
- SelectPAM Groups,Manage selected groups to register with the PAM appliance.The list of the Distinguished Names for all selected groups displays.
- Select and edit any group DN, or remove it from the staging list.
- SelectPAM Groups,Register selected groups with the PAM appliance.A window opens displaying a list of the staged groups. You can watch the progress, and can display any messages that are associated with the actions.
- When ready to import the groups, selectRegister Groupsin the lower-left corner.Privileged Access Managerimports the groups in the order that they are listed. The browser provides feedback and cancellation options throughout the process.You can cancel registration of a group, or you can cancel the registration of all groups, even after they have started.When the imports are finished, each line item in the registration window shows a green checkmark for success or a redXfor import failure/cancellation.
- (Optional) Review the status of the full list and each individual group by selecting its line item. If you made any changes, or any errors occurred for an individual group, the lowerMessagespanel provides details
- Go toDevices,Manage Device Groups,and
You cannot delete a record from an imported device group. Also, you cannot edit an LDAP-imported field.
Refresh LDAP Groups
You can refresh an LDAP Group to update the records in the group.
Follow these steps:
- In the UI, selectDevices, Manage Device Groups.
- Toward the right side of the page, selectRefresh LDAP Groups.The LDAP Browser launches the Refresh Registered LDAP Groups window.
- Select one or more groups you want to refresh and select Refresh Selected Groups.
Refresh Active Directory Device Groups After an OU Change
A change to organization unit (OU) of a device results in a change to the device DN. The modified DN can impact an access policy.
Symantec PAMhandles an OU change when the Active Directory group is refreshed automatically. During a refresh, the appliance searches the remote Active Directory Server and updates its device record. Despite the OU change, the policy for that device is preserved.
To reflect an OU change immediately, you can manually refresh an Active Directory group in
Symantec PAM. To keep the data in sync with Active Directory, refresh all the groups that now include the device
andall the groups from where the device moved.
Nested LDAP Groups
An LDAP group might be nested within another group as an element in a parent group member attribute. When the parent group is imported, all devices in the parent or the child are imported. For example, consider groups StateA and CityB, where group CityB is a member of (nested in) the group StateA. If you import the StateA group, you see every member of StateA and every member of CityB.
LDAP Browser Menus and Controls
The following table shows LDAP Browser controls.
Copy the Distinguished Name of selected entry to the Clipboard.
Display all the groups in this container.
After selecting an object in the tree under the Explore tab, click this button. You then switch to the Results tab, under which you see a fully expanded tree of all groups (objectClass: group) contained within the selected object.
Log in to an LDAP database. Invokes a pop-up window from which you can select from currently accessible domains.
Log out from the current LDAP domain.
Print currently selected node.
Close browser window.
Note: The browser continues running while a connection is active. During that time, the browser can be invoked again from the Devices, Manage Device Groups, Import LDAP Group.
Viewing options for graphical menu items below the main menu
Show Button Bar
Below the main menu bar, at the left side
Show Search Bar
Below the main menu bar, at the right side
Set LDAP Connection Timeout
Maximum time (seconds) before a connection attempt is canceled. This timeout is useful when multiple servers are specified for a particular LDAP domain.
Set Result Set Page Size
Maximum number of records in an LDAP directory before pagination is triggered for representation in the browser tree.
Number of records in each page of a paginated subtree.
A bookmark can be made on any leaf in a tree so you can select it later from the menu. Bookmarks are saved for each domain, and appear only when the browser is connected to that domain.
Opens an editing window for bookmarking currently selected leaf:
DN – pre-populated with the current Distinguished Name (DN)
Bookmark Name – pre-populated with the current Common Name (CN)
Opens a bookmark selection window. Selection in turn opens a bookmark editing window (see Add Bookmark).
Opens a bookmark selection window. Selection in turn deletes and confirms deletion of the bookmark.
Opens a detailed search specification window. (Contrast to Quick Search.)
Opens a window with a list of filters for selection and deletion.
Return Attribute Lists
Next Page of Results
Retrieve next page of results and display page wrapper in the Explore tree (when green; otherwise, gray when inapplicable).
Suspends an LDAP request. Suspending a request is useful when the page size is large and the browser is searching a large database.
Privileged Access Manager
Privileged Access Manager-specific menu items
Manage selected groups to register with the appliance.
Lists all items that are currently selected (or staged) for import to
Privileged Access Manager.
Register selected groups with the appliance
Perform the input operation on the items that are selected, which are listed in Manage selected groups to register with the
Privileged Access Managerappliance.
Icons appear in the Button Bar menu when that menu is active (or "on"). By default, the Button Bar is on.