Active Directory

Updated 1 month ago by admin

The Active Directory section allows you to configure synchronisation of one or more Active Directory domains with the USS cloud account. The advantage of this is that you can use Active Directory attributes in products that support them, such as Web Security and Cloud Application Control.

In the case of the Web Security product, it is still able to log usernames even without synchronising with Active Directory. However, you will not be able to enforce rules based on Active Directory attributes without synchronisation.
AD synchronisation uses a locally-install AD Connector service, which pushes objects securely to the USS Cloud.

To view and edit your AD syncs, visit your USS Dashboard and click ProductsWeb SecuritySettingsActive Directory.

Your existing Active Directory listings will be shown.

To add new domain, click the button. Enter the details of your new domain into the form that's displayed.

Domain

A description for the domain. Typically your Active Directory domain name, for example: ourdomain.local

Source name/IP

Enter the DNS name of the domain, or the name or IP address of a specific domain controller. Leave empty to use the server where the AD Connector is installed.

Protocol

Select the protocol to use for retrieving data from the domain controller(s). LDAPS utilises SSL/TLS encryption.

Credentials

Enter credentials for connecting to the domain controller(s).

A user with read access to Deleted Objects Container is required.

This can be entered in UPN format e.g. user@domain.local or using LDAP notation e.g. CN=ldapsync,CN=Users,DC=ourdomain,DC=local

Base DN

Enter the DN to use as the root of the search, or leave blank to sync the entire domain.

NetBIOS

Enter a specific NetBIOS name to use or attempt to detect NetBIOS domain automatically.

E-mail addresses

Select whether or not to import email addresses from Active Directory and optionally set the attribute containing the email address.

Click to add the domain to the list.

If you block outbound connections then it may be necessary to open TCP port 443 from the server the AD Connect agent is installed on, to the AD Connect web service.

You should now proceed to download and install the AD Connector service on your local network.


How did we do?