other message (red)—The server could be reached, but the con-
figuration is invalid. The error message returned by ldapsearch is dis-
played.
Server—The hostname(s) or IP address(es) of the LDAP server(s) that have
been added.
Action—After a server has been listed, it can be removed by clicking
the X-button.
Port: The port number of the LDAP server (default port numbers: regular
LDAP = 389; secure LDAP = 636)
Add additional server—Enter the hostname or IP address of the LDAP
server to be queried. You may list multiple servers.
LDAP Settings
Under the LDAP Settings tab, set the following parameters:
Server Type: This must be the correct type—check with your LDAP server
administrator if you are not sure which you are using. You have a choice of:
Active Directory: This will be used when the LDAP server is a Win-
dows server.
Open LDAP: This will be used when the LDAP server is a Linux/UNIX
server.
Server Base DN: Specifies the default base distinguished name to use for
searches. This is the base name to use in the database search. Typically, this
is the top-level of the directory tree structure. Your LDAP server admin-
istrator will provide this information.
Bind DN: Enter the Distinguished Name used to bind to (this is an optional
field if the database allows anonymous simple authentication). You are able
to use any same level of the tree and everything below.
The bind DN is the user that is permitted to search the LDAP dir-
ectory within the defined search base. Most of the time, the bind DN
will be permitted to search the entire directory. The role of the bind
DN is to query the directory using the LDAP query filter (as specified
under the Advanced tab) and search base for the DN for authen-
ticating users. When the DN is returned, the DN and password are
used to authenticate the user.
Bind Password: Enter the password to be used to bind with the LDAP
Server. Leave this field empty for anonymous simple authentication.
Checkbox Auto-follow Referrals: Allow the use of LDAP referrals to be util-
ized in order to access locations that more likely hold a requested object.
4.4 Managing Users and Security
CHAPTER 4 • VersaSync User Manual Rev. 12
253