Preparing to Configure LDAP Authentication
Before you configure Fortify Software Security Center to use LDAP authentication
Identity verification, typically with passwords. Authentication precedes authorization., complete the following tasks:
-
If you are not familiar with the LDAP schema that your LDAP server uses, you can use a third‑party LDAP management application such as JXplorer to view and modify LDAP authentication directories. (You can download JXplorer for free under a standard OSI‑style open source
A place in the code where malicious data can enter. license from http://www.jxplorer.org.) -
Create an LDAP account for Fortify Software Security Center to use.
Note: For information about how to configure the primary source for looking up users, see Configuring Core Settings.
Important! Never use a user account name to provide Fortify Software Security Center access to an LDAP server.
-
Check for conflicts between account names.
If the LDAP directory contains the default Fortify Software Security Center account
admin, a conflict occurs that can disable both accounts. If an existing Fortify Software Security Center account has the same name as an account defined for the LDAP server, Fortify Software Security Center account settings and attributes take precedence over those stored on the LDAP server.Note: Fortify recommends that no user names in the Fortify Software Security Center be duplicated on an LDAP server.
-
Gather and record required Information.
-
Fortify recommends that you disable the referrals feature.
See About the LDAP Server Referrals Feature and Disabling LDAP Referrals Support.
See Also