This chapter covers the setup of Veyon for connecting it to LDAP-compatible servers. In the following the generic term LDAP will be used and refers to all LDAP-compatible products and technologies such as OpenLDAP, Samba or Active Directory. LDAP integration enables you to use information about users, user groups, computers and locations that already exist in most environments, instead of manually replicating it in the Veyon configuration. Once configured Veyon Master can retrieve locations and computers to be displayed directly from the directory service. Additionally LDAP users and user groups can serve as a base for Computer access control.
The configuration of the LDAP integration is done on configuration page LDAP in Veyon Configurator. The page is divided into several subpages for Basic settings, Environment settings, Advanced settings and Integration tests.
The basic settings affect all basic parameters for accessing an LDAP server. They are mandatory for a properly working LDAP integration.
- LDAP server and port
Enter the address of the LDAP server (hostname or IP address) here. If a port other than the default LDAP port 389 is used, the port parameter has to be adjusted accordingly.
- Anonymous bind / Use bind credentials
Depending on the environment and configuration of the LDAP server, LDAP queries can be performed either as an anonymous user or with valid usernames and passwords only. If the server access requires a username and password, the option Use bind credentials has to be selected and the credentials have to be entered in the input fields below. Otherwise the default option Anonymous bind can be used.
- Bind DN
The bind DN is the username used to log in at the server in order to perform LDAP operations. However, the required format heavily depends on the LDAP server and its configuration. Possible formats include
- Bind password
In addition to the bind DN the corresponding password has to be entered.
You can use the Test button to verify, whether server access is working with the supplied parameters.
Veyon only requires read access to the LDAP directory. As an additional security measure on the LDAP server a dedicated user with read-only access to the LDAP directory can be created, e.g. “Veyon-LDAP-RO”. Access to relevant attributes can be further restricted for this user.
Veyon can establish encrypted connections to the LDAP server. For this purpose, settings are available in the section Connection security.
- Encryption protocol
You can choose between the encryption protocols None, TLS and SSL. The use of the modern TLS protocol is recommended.
- TLS certificate verification
This setting determines how the security certificate of the LDAP server is to be checked when the encrypted connection is established. With the default setting System defaults, depending on the operating system, an attempt is made to verify the certificate using the root certificates installed system-wide. The Windows certificate store is not taken into account here, so that a separate CA certificate file may have to be stored. With the Never setting, the server certificate is not verified at all. This however allows for case man-in-the-middle attacks and should therefore only be used in exceptional cases. The User-defined CA certificate file setting ensures that the certificate check is performed on the basis of a specified CA certificate file.
Default: System defaults
- Custom CA certificate file
If you use your own certification authority (CA), it may be necessary to store their certificate in a PEM file format so that Veyon can check the certificate of the LDAP server.
The base DN defines the address of the root object in the directory. All objects are stored below the base DN. Usually the base DN comes from the DNS or AD domain (see also RFC 2247).
In most cases a fixed base DN is used so the default option Fixed base DN has to be chosen. The base DN then has to be entered in the corresponding input field or selected from the server by using the Browse button. You can use the Test button to verify, whether the settings are correct and entries can be found.
If a generic Veyon configuration is to be used across multiple sites with different base DNs, Veyon can be configured so that the base DN is always queried dynamically using LDAP naming contexts. For this to work the Discover base DN by naming context has to be chosen and the naming context attribute must be adapted. You can use the Test button to verify, whether a Base DN could be determined.
After importing a generic Veyon configuration without a fixed base DN it is also possible to determine the base DN through the Command line interface and write it to the local configuration.
After the basic settings have been configured and tested, the environment-specific settings can now be made. These settings determine which trees contain objects of certain types as well as the names of certain object attributes. With these parameters Veyon can retrieve all required information from the LDAP directory.
Object trees are organizational or structural units in which certain types of objects (users, groups, computers) are stored. The respective CNs (Common Names) or OUs (Organizational Units) must be entered without the base DN part in the respective input field. Next to each input field there are buttons for opening browse dialogs and for testing the individual setting.
- User tree
The LDAP tree (without base DN) in which the user objects are located must be entered here, e.g.
- Group tree
The LDAP tree (without base DN) in which the group objects are located must be entered here, e.g.
- Computer tree
The LDAP tree (without base DN) in which the computer objects are located must be entered here, e.g.
- Computer group tree
If the computer groups are located in a different tree than the regular user groups or in a subtree, the corresponding LDAP tree can be specified here. Otherwise the group tree is used to query computer groups and to filter them with a specific object filter if necessary.
- Perform recursive search operations in object trees
This option can be used to control whether objects should be queried recursively. The search then takes place not only in the specified tree but also in any existing subtrees.
If objects of one type are stored in different object trees (e.g. users in both
CN=Teachers and in
CN=Students), the parameter for the corresponding object tree can be left empty and the option Perform recursive search operations in object trees can be activated. A recursive search is then performed in the entire LDAP directory starting from the base DN. In this case, however it is strongly recommended to set the object filters for the respective object type.
For Veyon to be able to retrieve the required information from the queried objects, the names of some object attributes have to be configured, as these differ substantially depending on the environment and LDAP server. Next to each input field buttons for browsing the attribute of an existing object and testing the respective attribute name are available.
- User login name attribute
This attribute must hold the login name of a user. The attribute is used to determine the LDAP user object associated with a particular username. In an OpenLDAP environment often the attribute name
uidis used while the name
sAMAccountNameis common in Active Directories.
- Group member attribute
Members of a group are listed in group objects through this attribute. The attribute is used to determine the groups a particular user is a member of. Depending on the configuration the attribute also used map computers to locations. In an OpenLDAP environment often the attribute name
memberis used while the name
memberUidis common in Active Directories.
- Computer display name attribute
The content of this optional attribute is used to determine the name of a computer displayed in Veyon Master. If left blank the common name (
cn) is used instead.
- Computer host name attribute
This attribute must hold the DNS name of the computer. It is used to determine the LDAP computer object associated with a particular computer hostname. In an OpenLDAP environment often the attribute name
nameis used while the name
dNSHostNameis common in Active Directories.
- Hostnames stored as fully qualified domain names (FQDN, e.g. myhost.example.org)
This option specifies whether to use the fully qualified domain name (FQDN) for mapping computer names to LDAP computer objects. If the computer names are stored without the domain part in the LDAP directory, this option has to be left disabled, otherwise it must be enabled.
- Computer MAC address attribute
In addition to the computer name the MAC addresses of computers are stored in the LDAP directory in some environments, for example if the DHCP server also accesses the LDAP directory. If the Veyon feature is to be used to switch on computers via Wake-on-LAN, the corresponding attribute name must be entered here, since the MAC address is required for this functionality. Typical attribute names are
In a standard Active Directory there is no attribute which stores MAC addresses. You must therefore populate MAC addresses manually in an existing unused attribute such as
wwwHomepage or extend the AD schema. Additionally you can grant computers group write access to
SELF and use a PowerShell script to make each computer automatically store the MAC address of its first physical LAN adapter when booting.
- Computer location attribute
If the LDAP schema for computer objects provides a special attribute for the mapping to a location, this attribute name can be entered here. The Test button can be used to verify whether the computers at a location can be queried correctly using the configured attribute. In the advanced settings, you can then specify in section Computer locations that the computer location attribute is used.
- Location name attribute
When identifying computer locations via computer groups or computer containers, the value of a certain attribute can be displayed as the location name instead of the Common Names of these groups or objects. If, for example, computer groups have an attribute called
description, a meaningful location name can be stored in this attribute and the attribute name can be entered here.
With the advanced settings the LDAP integration and the use of the information from the LDAP directory can be customized to individual needs.
Optional object filters
With LDAP filters, the LDAP objects used by Veyon can be narrowed down if, for example, computer objects such as printers are not to be displayed in the Veyon Master. Next to each input field there is a button for checking the respective object filter.
- Filter for users
You can define an LDAP filter for users here, e.g.
- Filter for user groups
You can define an LDAP filter for user groups here, e.g.
- Filter for computers
You can define an LDAP filter for computers here, e.g.
- Filter for computer groups
You can define an LDAP filter for computer groups here, e.g.
(cn=Room*). If computer groups are used as locations, you can filter the displayed locations this way.
- Filter for computer containers
You can define an LDAP filter for computer containers here, e.g.
(objectClass=organizationalUnit). If containers/OUs are used as locations, you can filter the displayed locations this way.
- Query nested user groups (supported by AD only)
If you have nested user groups (currently supported by Active Directory only), you can enable this option to make Veyon query all (even indirect) groups of a user. When enabled, you could for example create a group
Veyon Userswith the existing user groups
IT Staffas members. The
Veyon Usersgroup can then be used for Access control purposes.
Group member identification
The content of the group membership attributes varies across different LDAP implementations. While in Active Directory the distinguished name (DN) of an object is stored in the member attribute, OpenLDAP usually stores the user login name (
uid or similar) or the computer name. In order for Veyon to use the correct value for querying groups of a user or computer, the appropriate setting must be chosen here.
- Distinguished name (Samba/AD)
This option has to be chosen, if the distinguished name (DN) of an object is stored in a member attribute of the group. Usually Samba and AD server use this scheme.
- Configured attribute for user login name or computer hostname (OpenLDAP)
This option has to be chosen, if the login name of a user (username) or the hostname of a computer is stored in the member attributes of a group. Usually OpenLDAP server use this scheme.
Veyon offers several methods to represent computer locations in an LDAP directory. In the simple case there is one computer group for every location (e.g. room). All computers at a specific location are members of the corresponding group. If computers instead are organized in containers or organizational units (OUs), these parent objects can be used as locations. Both procedures do not require any adaptation of the LDAP schema. As a third possibility, the location name can also be stored as a special attribute in each computer object.
- Computer groups
This option specifies that computer locations are identified through computer groups. All computer groups are then displayed as locations in the Veyon Master. For each location all computers that are members of the corresponding group are displayed. If not all LDAP groups are to be displayed as locations, either a dedicated computer group tree must be configured or the computer groups must be restricted using a computer group filter.
- Computer containers or OUs
This option specifies that the containers/OUs containing computer objects are used as computer locations. Containers are objects that are parents to computer objects in the LDAP tree. If not all containers are to be displayed as locations, a corresponding computer container filter can be set up.
- Location attribute in computer objects
If the LDAP schema for computer objects provides a special attribute for mapping computer objects to locations, this option can be enabled and the attribute name can be entered. The Test button can be used to check whether the members of a computer location can be queried correctly using the configured attribute.
The integration tests can be used to check the LDAP integration as a whole. The buttons allow various tests to be performed. All tests should be successful and provide valid results before the LDAP connection is used in production.
Using LDAP backends
With the successful configuration and testing of the LDAP integration, the LDAP backends can now be activated. For this, the network object directory and the user groups backend for the computer access control must be adapted. Only after switching the network object directory to LDAP the location and computer information from the LDAP directory are used in the Veyon Master.
After changing the backend for the computer access control, all previously configured access rules should under all circumstances be checked, since group and location information change and in most cases access rules will no longer be valid or not be processed correctly.
Command line interface
The Command line interface of Veyon allows some LDAP-specific operations. All operations are available using the
ldap module. A list of all supported commands is displayed via
veyon-cli ldap help, while command-specific help texts can be displayed via
veyon-cli ldap help <command>.
This command can be used to automatically determine the used base DN and permanently write it to the configuration. An LDAP server URL and optionally a naming context attribute have to be supplied as parameters:
veyon-cli ldap autoconfigurebasedn ldap://192.168.1.2/ namingContexts veyon-cli ldap autoconfigurebasedn ldap://Administrator:MYPASSWORD@192.168.1.2:389/
Special characters such as
: – especially in the password - can be specified by using URL percent-encoding.
This command allows querying LDAP objects (
users) and is mainly used for testing. The function can also be used to develop scripts for system integration tasks.
veyon-cli ldap query users veyon-cli ldap query computers