Skip to content
CA Test Data Manager - 4.2
Documentation powered by DocOps

Active Directory Integration with the CA TDM Portal

Last update March 22, 2017

Active Directory enables your security teams to authenticate and authorize user access and privileges from a central location. To allow authorized users to access the CA TDM Portal, ensure that you perform the following actions:

  • Verify that the appropriate users are present in the Active Directory group that is configured for the CA TDM Portal.
  • Verify that the same users are already configured for Active Directory in Datamaker. For more information about user management in Datamaker, see the Users section.
  • Integrate Active Directory with the CA TDM Portal by following the steps in this article.

Follow these steps:

  1. Navigate to the TDM_HOME\conf location.
    Note: TDM_HOME represents the location where you installed the CA TDM Portal. For example, C:\Program Files\CA\CA Test Data Manager Portal\.
  2. Locate and open the application.properties file in a text editor.
  3. Configure the following parameters to integrate Active Directory with the CA TDM Portal:
    • ldap.authentication
      Specifies the type of authentication that you want to use—native authentication or Active Directory authentication. In native authentication, the CA TDM repository is used to verify whether a specific user is present in the repository. If the user is present, the user is authenticated and is allowed to log into the application. In Active Directory authentication, the user authentication happens against Active Directory. This method requires that the same user is already added and present in the CA TDM repository. 
      Applicable values are true and false. The value false implies you want to use native authentication. The value true implies you want to authenticate against Active Directory.
      Default: false
      Example: ldap.authentication=false
    • ldap.adgroup
      Specifies the Active Directory user group that is created for CA TDM. The CA TDM Portal verifies whether the user is part of this group. All users added to this group can log into the CA TDM Portal instance and can access the functionality, provided the user already exists in the CA TDM repository. 
      Example: ldap.adgroup=GT_DM_ACCESS
    • ldap.user.id.attribute
      Specifies the user ID attribute based on your Active Directory installation.
      Example: ldap.user.id.attribute=cn
    • ldap.group.id.attribute
      Specifies the user group ID based on your Active Directory installation.
      Example: ldap.group.id.attribute=cn
    • ldap.user.object.class
      Specifies the type of the object class for the user.
      Example: ldap.user.object.class=person
    • ldap.group.object.class
      Specifies the type of the object class for the user group.
      Example: ldap.group.object.class=group
    • ldap.ou_people
      Specifies the organization unit where you can find users that are associated to a specific organization.
      Example: ldap.ou_people=CN=Users
      Note: If users are spread across different organizational units, leave this parameter value empty. Additionally, configure your LDAP server URL (ldap.contextSource.url) parameter to point to the Global Catalog server (for example, ldap://12.345.67.89:3268) instead of the LDAP server.
    • ldap.ou_group
      Specifies the organization unit where you can find user groups that are associated to a specific organization.
      Example: ldap.ou_group=CN=Users
    • ldap.group.member.attribute
      Specifies the members in a specific user group.
      Example: ldap.group.member.attribute=member
    • ldap.contextSource.referral
      Specifies whether you want to follow or ignore the reference to another source if the user in one group is also part of the other group.
      Example: ldap.contextSource.referral=follow
    • ldap.contextSource.url
      Specifies the URL where Active Directory is available. The format is ldap://<ldap_system>:<ldap_port>. The default port is 389.
      Example: ldap.contextSource.url=ldap://12.345.67.89:389
    • ldap.contextSource.base
      Specifies the Active Directory base domain name.
      Example: ldap.contextSource.base=DC=sinsa12ad,DC=com
    • ldap.contextSource.userDn
      Specifies the user who is allowed to access the Active Directory server.
      Example: ldap.contextSource.userDn=CN=Administrator,CN=Users,DC=sinsa12ad,DC=com
    • ldap.contextSource.password
      Specifies the password that is associated with the user who is allowed to access the Active Directory server.
      Example: ldap.contextSource.password=P@ssword01
  4. Save your changes.
    You have successfully configured Active Directory.
Was this helpful?

Please log in to post comments.