Active Directory Integration with the CA TDM Portal
Last update March 22, 2017
Active Directory enables your security teams to authenticate and authorize user access and privileges from a central location. To allow authorized users to access the CA TDM Portal, ensure that you perform the following actions:
- Verify that the appropriate users are present in the Active Directory group that is configured for the CA TDM Portal.
- Verify that the same users are already configured for Active Directory in Datamaker. For more information about user management in Datamaker, see the Users section.
- Integrate Active Directory with the CA TDM Portal by following the steps in this article.
Follow these steps:
- Navigate to the TDM_HOME\conf location.
Note: TDM_HOME represents the location where you installed the CA TDM Portal. For example,
C:\Program Files\CA\CA Test Data Manager Portal\.
- Locate and open the application.properties file in a text editor.
- Configure the following parameters to integrate Active Directory with the CA TDM Portal:
Specifies the type of authentication that you want to use—native authentication or Active Directory authentication. In native authentication, the CA TDM repository is used to verify whether a specific user is present in the repository. If the user is present, the user is authenticated and is allowed to log into the application. In Active Directory authentication, the user authentication happens against Active Directory. This method requires that the same user is already added and present in the CA TDM repository.
Applicable values are
false. The value
false implies you want to use native authentication. The value
true implies you want to authenticate against Active Directory.
Specifies the Active Directory user group that is created for CA TDM. The CA TDM Portal verifies whether the user is part of this group. All users added to this group can log into the CA TDM Portal instance and can access the functionality, provided the user already exists in the CA TDM repository.
Specifies the user ID attribute based on your Active Directory installation.
Specifies the user group ID based on your Active Directory installation.
Specifies the type of the object class for the user.
Specifies the type of the object class for the user group.
Specifies the organization unit where you can find users that are associated to a specific organization.
Note: If users are spread across different organizational units, leave this parameter value empty. Additionally, configure your LDAP server URL (
ldap.contextSource.url) parameter to point to the Global Catalog server (for example,
ldap://12.345.67.89:3268) instead of the LDAP server.
Specifies the organization unit where you can find user groups that are associated to a specific organization.
Specifies the members in a specific user group.
Specifies whether you want to follow or ignore the reference to another source if the user in one group is also part of the other group.
Specifies the URL where Active Directory is available. The format is ldap://<ldap_system>:<ldap_port>. The default port is 389.
Specifies the Active Directory base domain name.
Specifies the user who is allowed to access the Active Directory server.
Specifies the password that is associated with the user who is allowed to access the Active Directory server.
- Save your changes.
You have successfully configured Active Directory.
Was this helpful?
Thank you for your feedback.