Cloud Access Service Quick Setup Guide for RADIUS Clients - Step 4: Connect LDAP Directory
Perform these steps to connect to an LDAP directory quickly using only required settings. If you want to use advanced options, see Add an Identity Source.
Procedure
- In the Cloud Administration Console, click Users > Identity Sources.
- Click Add an Identity Source > Select next to Active Directory.
- Click Add an Identity Source > Select next to the directory to add.
- Enter the identity source name and root (the base DN for users from the planning worksheet).
- In the SSL/TLS Certificate section, unselect Use SSL/TLS encryption to connect to the directory servers.
- In the SSL/TLS Certificates section:
- Select Use SSL/TLS encryption to connect to the directory servers.
- Click Add and select the SSL/TLS certificate.
- In the Directory Servers section, add each directory server in the identity source, and test the connection.
- Click Next Step.
- On the User Attributes page, click Refresh Attributes, and verify that a valid list of attributes appears.
Select Use selected policy attributes with the Cloud Authentication Service.
In the Policies column, select sAMAccountName, virtualGroups, and memberOf or other attributes that you might use to identify users.
- Click Next Step.
In the User Search Filter field, specify your test group using a filter. The following is an Active Directory example:
(&(objectCategory=Person)(sAMAccountName=*)(objectClass=user)(mail=*)(memberOf=<yourgroup_distinguishedName>))
Where <yourgroup_distinguishedName> is the name of your test administrator group.
For example, (&(objectCategory=Person)(sAMAccountName=*)(objectClass=user)(mail=*)(memberOf=CN=SecurIDAccessUsers,OU=Groups,DC=Corp,DC=local))
- Click Save and Finish.
- Click Publish Changes.
Synchronize LDAP Directory for Cloud Access Service
Synchronize data between Cloud Access Service (CAS) and your LDAP directory to ensure that CAS reflects any updates made to the LDAP directory.
During synchronization, users are added and attribute values that you selected in the previous step are copied to CAS. User passwords are not synchronized.
Procedure
- In the Cloud Administration Console, click Users > Identity Sources.
- Next to your identity source, select Synchronization from the drop-down menu.
In the Identity Source Details section, click Synchronize Now.
Depending on the number of users you are synching, this process can take a number of minutes.
Cloud Access Service Quick Setup Guide for RADIUS Clients - Step 5: Add an Access Policy
Related Articles
SID: sd_login error unable to communicate with Authentication server 45Number of Views Admin Error Notification Rule will send any type of errors in RSA Governance & Lifecycle 1Number of Views How to disable the automatic startup of RSA Identity Governance & Lifecycle when the server is rebooted 78Number of Views ORA-02292: integrity constraint (AVUSER.FK_CONN_PROP_TO_CONN_TYPE_PROP) violated - child record found error when deleting … 143Number of Views Cloud Access Service Quick Setup Guide for RADIUS Clients - Step 3: Enable RADIUS on the Cluster 58Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle