This is an old revision of the document!



LDAP and Role Based Access (RBA)

  • RADIUSdesk allows the admin of a cloud to be in one of three possible roles.
    • Admin
    • Operator
    • View
  • The rights of the admin is dictated by the role they are in.
  • This document will cover the optional configuration that allows you to map LDAP groups to the respective available roles.

Group Attribute

  • The RADIUSdesk implementation allows you to specify the LDAP attribute which contains the groups a user belongs to.
  • If you have an OpenLDAP deployment, you might have to add the memberof overlay.
  • This link describes the process in more detail: https://tylersguides.com/guides/openldap-memberof-overlay/
  • If you have an Active Directory deployment, make sure the user that does the initial bind can read the memberOf attribute.
  • This link covers the items you need to double check: http://www.michaelm.info/blog/?p=1435

LDAP group to RBA mapping

  • The LDAP group to RBA mapping is optional functionality available as a complement to the standard LDAP integration.
  • To ensure that the LDAP user has a pleasant experience the first time they log in, we pre-define the default Cloud and Realm they will be assigned to.
  • As stated earlier, we also give the option to specify the attribute that will contain the groups the user belongs to.
  • The recommended value is memberof, all in lowercase.

  • The Admin role will typically include the most components to include.

  • The Operator role will typically have less components selected compared to the Admin role, but more components then the View role.

  • The View role will typically have the least components selected of the available three roles.

Adjusting the rights of a role

  • technical/ldap-integration-rba.1749355950.txt.gz
  • Last modified: 2025/06/08 06:12
  • by system