Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
404
Group Configuration for LDAP Authentication
Domains
Lightweight Directory Access Protocol (LDAP) is a standard for querying and updating a directory. Because LDAP
supports a multilevel hierarchy (for example, groups or organizational units), the SMA/SRA appliance can query
this information and provide specific group policies or bookmarks based on LDAP attributes. By configuring LDAP
attributes, the SMA/SRA appliance administrator can leverage the groups that have already been configured in
an LDAP or Active Directory database, rather than needing to manually recreate the same groups in the
SMA/SRA appliance.
After an LDAP authentication domain is created, a default LDAP group is created with the same name as the
LDAP domain name. Although additional groups can be added or deleted from this domain, the default LDAP
group cannot be deleted. If the user for which you created LDAP attributes enters the Virtual Office home page,
the bookmark you created for the group the user is in displays in the Bookmarks Table.
For an LDAP group, you can define LDAP attributes. For example, you can specify that users in an LDAP group
must be members of a certain group or organizational unit defined on the LDAP server. Or you can specify a
unique LDAP distinguished name.
To add an LDAP attribute for a group so that a user has a bookmark assigned when entering the
Virtual Office environment, complete the following steps:
1 Navigate to the
Portals > Domains
page and click
Add Domain
to display the
Add New Domain
window.
2 Select
LDAP
from the
Authentication Type
menu. The LDAP domain configuration fields are displayed.
NOTE:
The Microsoft Active Directory database uses an LDAP organization schema. The Active Directory
database might be queried using Kerberos authentication (the standard authentication type; this is
labeled “Active Directory” domain authentication in the Secure Mobile Access management interface), or
using LDAP database queries. An LDAP domain configured in the Secure Mobile Access management
interface can authenticate to an Active Directory server.