Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.

USxS Redesign projects optionally support Windows Active Directory Services (ADS) using LDAP queries.  Support for ADS is provided by an optional module which supports up to three ADS domains.

Install ADS Module

To install the module, login as the admin user and navigate to System -> Modules, and install the org.ssdt_ohio:ssdt.common.authnz-ads module by clicking the "+"  icon.  

You must restart the application after installing this module.  ADS authentication will be active after the restart.


WIth the module installed, navigate to System->Module Configuration and edit the Windows Active Directory Authentication configuration:

Enable one or more of the configurations and enter at least the LDAP URL of the domain server.   Hover your cursor over each field for more details and defaults.  It is not necessary to restart the application after changing this configuration.  The configuration changes take effect immediately when the configuration is saved.

Default Domain

If multiple ADS domains are configured, each one is attempted in order.  If authentication succeeds, the user profile in the application is checked.  The username field in the application profile must match the user's login name.  See Authentication & Authorization for details on the authentication process. 

The "ADS Domain" in the configuration affects the users login name.  For example, consider the user "smith" in a domain "".   If the "ADS Domain" field is left blank, then the user must specify the fully qualified name of "" when logging in and the username field in the application's user must contain "".  However, if the "ADS Domain" field contains "", then the user can login without specifying the domain, and the profile username is simply "smith".

For this reason, when configuring multiple domains, it is strongly recommended that only one domain specify an "ADS Domain".  The others should be blank to force the user to specify the fully qualified name to prevent collisions.  If a default is provided for more than one domain, and a user "smith" exists in both domains, they will share the same profile in the application.

Preventing External Authentication

It may be necessary to restrict which user(s) can authenticate using Windows ADS or LDAP.  For example, you may wish to force the 'admin' user to authentication locally.   One choice is to specify an LDAP "Search Filter" to restrict users or attribute who are allowed to authenticate with a particular domain.  The default "Search Filter" is:

Code Block

Which simply looks the up the username by the LDAP userPrincipalName

To remove 'admin' users from the filters, you would use the following filter:

Code Block
(&(objectClass=user)(userPrincipalName={0}) (!(userPrincipalName=admin*))  )


In the future, it will be possible to implement custom rules to future customize which user can authenticate using various authentication sources.