Quick guide to setup LDAP access protocol in Exivity

Setting up LDAP in Exivity

Make sure you have Administrator rights when performing the following steps.
First, go to Administration > Settings > Single sign-on and choose the LDAP tab:
Fill in the required Server and Attributes section parameters, and click on UPDATE.
Server section:
Domain controllers
The domain controllers option is an array of servers located on your network that serve Active Directory. You can insert as many servers or as little as you'd like depending on your forest (with the minimum of one of course). Separate multiple servers with a single space.
Depending on your chosen encryption use 389 (unencrypted or TLS) or 636 (SSL)
The timeout option allows you to configure the amount of time in seconds that your application waits until a response is received from your LDAP server.
Choose your desired encryption, SSL and TLS are supported. If you choose encryption make sure you read the section Setting up your security certificate.
Attributes section:
Base DN
The base distinguished name is the base distinguished name you'd like to perform query operations on. (optional)
Account prefix
The account prefix option is the prefix of your user accounts in LDAP directory. This string is prepended to all authenticating users usernames. (optional)
Account suffix
The account suffix option is the suffix of your user accounts in your LDAP directory. This string is appended to all authenticating users usernames. (optional)
Default user group
When a new user logs in using LDAP, a user will be created in this user group. (recommended)
Finally, go to the System tab, in the Core section, set the Single Sign-On parameter to Local and LDAP Authentication and click on UPDATE.
Setting SSO to LDAP
Now Exivity is configured to login users using LDAP authentication.

Setting up your security certificate

This section only needs to be performed if you have chosen encryption SSL or TLS to authenticate with LDAP. These steps are done in the Exivity server side.
If you don't have a certificate in .pem format you can convert your current certificate with the OpenSSL tool.
Once you have your pem certificate stored in the server hard drive, take a note of its path, and create a system environmental variable LDAPTLS_CACERT . The value of this environment variable will be the certificate full path.
Finally, restart the Exivity Web Service.
Restarting the Exivity Web Service in Task Manager