Configuring AnzoGraph to use LDAP Authentication (Preview)

By default, the AnzoGraph front end console is configured to use authentication and authorization credentials maintained by AnzoGraph itself. You can also configure the AnzoGraph front end console to use a specified LDAP or directory service to authenticate users and authorize AnzoGraph operations based on user membership in LDAP groups. See Creating and Managing AnzoGraph Roles from the Console (Preview) for information on creating uer roles and granting or revoking permissions to access specific AnzoGraph database objects (graphs, views, and queries), whether you are using local AnzoGraph or LDAP service authentication of users.

Defining an LDAP Configuration for AnzoGraph Authentication

To configure the AnzoGraph front end console and AnzoGraph to use LDAP authentication:

  1. Select LDAP Configuration from the Server Settings list to display the LDAP Configuration screen.
  2. On the LDAP Configuration screen, configure the connection to your AnzoGraph deployment by selecting the Enable LDAP Authentication checkbox and then choosing among the various radio button options and supplying values for the required fields. Selecting the Enable LDAP Authentication checkbox enables front end authentication using the the LDAP configuration.

    Field entries for the LDAP Configuration are the following:

    • Enable LDAP Authentication checkbox: Selection that allows you to enable front end authentication using the LDAP configuration.
    • Host: Host name or IP address of the LDAP directory server.
    • Port: The port used to connect to the LDAP directory server.
    • HTTPS radio buttons: Specifies whether the directory server uses an SSL (LDAPS) or a StartTLS protocol connection.
    • User Base DN: LDAP distinguished name that contains users than can be authenticated, for example: dc=example,dc=org.
    • User Filter Prefix: Property name that a user name is mapped to, for example: cn.
    • Groups Search Filter: Filter used to search for LDAP group names, for example: (objectClass=groupOfUniqueNames).
    • Groups Member Filter Prefix: Property name prefix used for searching if user is part of group, for example: uniqueMember.
    • Search Subtree checkbox: Option to specify whether to search LDAP subtrees.
    • Anonymous Bind checkbox: Option to specify whether the AnzoGraph front end console connects to the directory server anonymously.
    • User DN: Full distinguished name of the account that the AnzoGraph front end console will bind against to perform authentication on the directory server, for example: cn=admin,dc=example,dc=org.
    • Password: Password specified for the User DN.
  3. When you have supplied all of the necessary connection details, click Test Connection at the bottom of the screen to ensure that the connection with your LDAP directory service can be made.

    If the test fails, adjust the values as needed and test the connection again.

  4. Click Save to save the connection.

Enabling LDAP Authentication for the AnzoGraph Console

To use an LDAP configuration to authenticate Console login and authorize AnzoGraph operations users are able to perform, you need to update settings in the AnzoGraph settings.conf configuration file. That is, to enable external LDAP authentication to the console, you need to configure the following options in the AnzoGraph settings.conf file (located in the InstallDir/anzograph/config directory) :


After updating the settings in the AnzoGraph configuration file, you need to restart AnzoGraph for the new settings to take effect. For example:

/InstallDir/anzograph/bin/azgctl  -restart

With these new ACL settings, AnzoGraph front end console users will be authenticated against an externally- configured LDAP directory service. A user's LDAP group membership information will be passed to AnzoGraph along with any submitted SPARQL query request or statement they submit to help in authorizing requests. Where AnzoGraph roles are already defined that match the names of LDAP groups a user is a member of, the AnzoGraph assigned role permissions will determine a user's authorization or permission to execute any submitted SPARQL request.

See Authentication and Access Control (Preview) and LDAP/Directory Services Integration for more information on AnzoGraph ACL operations and additional methods of integrating LDAP directory services with AnzoGraph.

You can now use the front end console using LDAP directory service authentication of users. For more information on using the front end console, see Using the Query & Admin Console. Also refer to Creating and Managing AnzoGraph Roles from the Console (Preview) for information on defining or updating roles that control Console user access and permissions.

Related Topics