R12.1-JA-2025June05
Configure AD Authentication
![]() | Note: Make sure the SAMAccountname attribute is properly configured on the AD server for the target group members. The attribute will be used as the login username of the system. |
- Log in to System Management Page.
- On the System Management page, click User Accounts > External Authentication.
- Click the
icon and select Add AD Authentication from the drop-down list. A wizard is opened to guide you through the steps to connect to the AD server and configure the tenant or domain access privileges for the imported user accounts.
- Enter a unique name to identify the AD server and a brief description.
- Enter the credentials to connect to the AD server. See AD Server Settings for more details.
- Click Show Group to find available user groups from the AD server. All matched groups are listed in the Groups pane.
- Select one or more user groups to import, and then click Next.
Note: The user accounts in a primary group of the AD server can be synchronized into the system but cannot log in. Tip: Click Validate to verify whether the selected groups still exist on the AD server. Click the icon to remove an invalid group from the list.
- Assign domain access and more privileges to the user accounts in the selected groups under the Set Tenant/Domain Access for Group tab.
- System Admin — click to assign the system administrator role to the user accounts. For the detailed privileges of System Management and User Management, refer to Featured Management Privileges.
- Tenant Access — select one or more tenants to assign access permissions to the user accounts.
- Tenant Admin — select one or more tenants to assign the tenant administrator role to the user accounts.
- Allowed to Create Domain — select the check box to assign the domain creation permission to the user accounts.
- Domain Access — select one or more domains to assign access permissions to the user accounts.
- Domain Privileges — click Assign Privileges to assign more domain privileges to the user accounts by role. See Configure Share Policy for more details.
- Click Save to commit the settings.
- In the pop-up dialog box, enter the username and password of a user account under the specified server address or user root and click Verify to authenticate the connection.
- Click OK.
- Navigate to the Users tab and click Synchronize With LDAP/AD Server to immediately load the user accounts imported from the AD server. Alternately, the user accounts can also be automatically synchronized after the first-time login.
Note: The synchronization will only carry out on the enabled authentications. If you add a new user account to the selected group on the AD server after the synchronization, the user can immediately log in to the specified domains with the assigned roles and privileges. If you delete any user accounts from the AD server, the changes will not be synchronized with the system automatically. You have to manually remove them from the system. Note: To prevent the assigned roles and privileges of an external user account from syncing with any changed authentication settings, you can uncheck the Overwrite with External Server Settings checkbox.
Using SSL on AD Server
If you configured SSL on the AD server, complete the following configurations to connect to NetworkBrain Web API Server using the Secure(SSL) connect type.
- On NetworkBrain Web API Server, do the following:
You can skip the following step a and step b by adding NetworkBrain Web API Server into the domain of the AD server. - Import the CA certificate used on the AD server into the Trusted Root Certification Authority directory as follows:
- Configure the IP address of the AD server as the preferred DNS server through Network Settings, and then restart the network service.
- Add the mapping relationship between the IP address and hostname of the AD server into the local file, which is located under the C:\Windows\System32\drivers\etc\ directory.
- Import the CA certificate used on the AD server into the Trusted Root Certification Authority directory as follows:
- When configuring the connection information on the External Authentication tab, enter the FQDN of the AD server in the Server Address field.