Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
405
3 Enter a descriptive name for the authentication domain in the Domain Name field. This is the domain
name users select in order to log in to the Secure Mobile Access user portal. It can be the same value as
the Server address field.
4 Enter the IP address or domain name of the server in the Server address field.
5 Enter the search base for LDAP queries in the LDAP baseDN field. An example of a search base string is
CN=Users,DC=yourdomain,DC=com.
6 Enter a Server address that has been delegated control of the container that server is in.
7 Enter the user name along with the corresponding password in the Login user name and Login
password fields.
8 Enter a Backup Server address.
9 Enter the backup user name along with the corresponding backup password in the Login user name and
Login password fields
10 Select the name of the portal in the Portal name field. Additional layouts can be defined in the Portals
> Portals page.
11 Select Allow password changes (if allowed by LDAP server) if you want to be able to change user’s
passwords. The admin account must be used when changing user passwords.
12 Optionally select Use SSL/TLS. This option allows for the needed SSL/TLS encryption to be used for
Active Directory password exchanges. This check box should be enabled when setting up a domain using
Active Directory authentication.
13 Optionally select Enable client certificate enforcement to require the use of client certificates for
login. By checking this box, you require the client to present a client certificate for strong mutual
authentication. Two additional fields appear:
• Verify user name matches Common Name (CN) of client certificate - Select this check box to
require that the user’s account name match their client certificate.
• Verify partial DN in subject - Use the following variables to configure a partial DN that matches
the client certificate:
• User name: %USERNAME%
• Domain name: %USERDOMAIN%
• Active Directory user name: %ADUSERNAME%
• Wildcard: %WILDCARD%
14 Select Delete external user accounts on logout to delete users who are not logged into a domain
account after they log out.
15 Select Only allow users listed locally to allow only users with a local record in the Active Directory to
login.
16 Select Auto-assign groups at login to assign users to a group when they log in.
Users logging into Active Directory domains are automatically assigned in real time to Secure Mobile
Access groups based on their external AD group memberships. If a user’s external group membership has
changed, their Secure Mobile Access group membership automatically changes to match the external
group membership.
TIP: It is possible for multiple OUs to be configured for a single domain by entering each OU on a
separate line in the LDAP baseDN field. In addition, any sub-OUs is automatically included when
parents are added to this field.
NOTE: Do not include quotes (“”) in the LDAP BaseDN field.
NOTE: When entering Login user name and Login password, remember that the SMA/SRA
appliance binds to the LDAP tree with these credentials and users can log in with their SMA
AccountName.