This article provides the steps for setting up SDO Authentication to work with your External or On-Premise Active Directory. Once configured, your users will be able to log into the local Active Directory by authenticating the connection through the SDO app on their mobile devices instead of entering a traditional password.
Before you Begin
Setting up SDO Authentication for External AD in the Control Panel will change the directory that SDO uses to populate users in the Control Panel. As a result of this, any users that are already listed in the Control Panel, as well as any SDO services they have enabled, will be removed immediately once the Control Panel has been linked to your External AD.
If you plan on enabling SDO Authentication for External Active Directory, we highly recommend you configure it first before setting up SDO for any other services in the Control Panel. This will prevent complications from having two separate directories associated with your services in SDO.
Prior to enabling and configuring the SDO External AD Service, you will need to collect some information from the external Active Directory environment. You will also need to enable LDAP over SSL (LDAPS) on your domain controller, and install a certificate to secure the SSL connection.
Setting up LDAP over SSL
Enabling a secure LDAP connection to import your users for Authentication requires the installation of an SSL Certificate. This can be done using either a Self-Signed certificate, or with the use of a certificate from a third-party Certificate Authority. The following article provides guidance for each option:
Required Directory Information
The following information will need to be collected from the external AD environment:
- User DN: The Distinguished Name of the administrative user account that will allow access to import content from the external directory. The User DN can be obtained by running a dsquery user search in an administrative command prompt or powershell session on the domain. An example User DN could appear as follows.
- User DN Password: The password for the administrative user account.
- NETBIOS Domain Name: The NetBIOS name of the domain. This can typically be within the Active Directory Users and Computers configuration tool by right-clicking the domain and selecting Properties. The NetBIOS name will be listed in the "Pre-Windows 2000" field. An example NetBIOS name could appear as follows:
- Base DN: The Distinguished Name of the directory containing the users who will authenticate via SDO. If only a specific set of users will be configured to authenticate via SDO, they should be placed into a specific OU and the DN of that OU should be provided here. An example Base DN could appear as follows:
- Host Name/URL: The URL of the public LDAPS directory server. This would typically be the Fully Qualified Domain Name of the Domain Controller. An example Host Name/URL could appear as follows:
- Base-64 Encoded Certificate: The LDAPS certificate that was either Self-Signed via the Certification Authority installed on your domain, or that was provided by your third-party Certificate Authority. The certificate should be saved locally as either a .cer or .pem file.
Enabling SDO Authentication for External AD
- In the Control Panel, click on My Services from the left-hand menu.
- Click on the Secret Double Octopus vendor band to expand it.
- Click the Active External Active Directory cloud icon.
- Enter the User DN, User DN Password, NETBIOS Domain Name, Base DN, and Host Name/URL information as described in the previous section.
- Drag-and-drop the LDAPS certificate from your computer to the designated box, or click on the box to browse your computer for the certificate.
- Click the Confirm button.
- The User Licenses tab will clear as the Control Panel switches directories to your External AD. Wait a few minutes, and the click the Refresh User Data button to populate the User Licenses tab with the users from your External directory. Please note that you may need to click the Refresh User Data button a few times for it to finish populating.