Ambari: Specifying LDAP Settings

Specifying LDAP settings in Ambari.

For general information about user authentication, see Configuring User Authentication Using LDAP.

After Installing Arcadia Enterprise Using Ambari Stacks, perform the following steps on the Ambari configuration interface to specify LDAP settings:

  1. In the Ambari interface, click Services in the top navigation menu.
  2. Click Arcadia Enterprise on the left navigation bar.
  3. Click the Configs tab near the top of the interface.
  4. Click the (right arrow) icon to the left of Advanced arcadia-visualization-server.
  5. Search for the ArcViz Settings field.
    Displaying the field for entering LDAP settings
    Display Field for Entering LDAP Settings
  6. In the ArcViz Settings field, use the following sample code for Active Directory, and modify the settings as appropriate. For more information, see
    import ldap
    from django_auth_ldap.config import LDAPSearch, NestedActiveDirectoryGroupType
    # Connection options
    # AUTH_LDAP_START_TLS = Trueinst
    AUTH_LDAP_SERVER_URI = "ldap://host:port"
    # Bind user
    AUTH_LDAP_BIND_DN = "CN=arcadmin,CN=Users,DC=arctest,DC=arcadiadata,DC=com"
    # Required Group for all users
    AUTH_LDAP_REQUIRE_GROUP = "CN=arcviz users,CN=Users,DC=arctest,DC=arcadiadata,DC=com"
    # Group for Admins (Optional)
      "is_superuser": ["CN=arcviz admins,CN=Users,DC=arctest,DC=arcadiadata,DC=com"]
    # User and group search objects and types
    AUTH_LDAP_USER_SEARCH = LDAPSearch("CN=Users,DC=arctest,DC=arcadiadata,DC=com",
    AUTH_LDAP_GROUP_SEARCH = LDAPSearch("CN=Users,DC=arctest,DC=arcadiadata,DC=com",
                            ldap.SCOPE_SUBTREE, "(objectClass=group)")
    # Map LDAP attributes to Django
      "first_name": "givenName",
      "last_name": "sn",
      "email": "mail"
    # Cache settings
    # Note this may cause a delay when groups are changed in LDAP
    # Group Settings
    AUTH_LDAP_GROUP_TYPE = NestedActiveDirectoryGroupType()
    # Some optional TLS/SSL options
    #   ldap.OPT_X_TLS_CACERTFILE: "/etc/bla.cert",        # Point to CA Cert file
    #   ldap.OPT_X_TLS_REQUIRE_CERT: ldap.OPT_X_TLS_NEVER, # Disable cert checking
    # }
      ldap.OPT_DEBUG_LEVEL: 1,  # 0 to 255
      ldap.OPT_REFERRALS: 0,  # For Active Directory
    # If there is no Bind User you can use these settings, but it's not the preferred way
    # AUTH_LDAP_USER_DN_TEMPLATE = "CN=%(user)s,CN=Users,DC=arctest,DC=arcadiadata,DC=com"
    # The backend needed to make this work.
  7. Click Save.
  8. After you save the configuration, the interface allows you to restart services. Click Restart to apply configuration changes.
    clicking the restart tab on the top right of the Ambari interface to restart Arcadia Enterprise service and apply configuration changes
    RestartArcadia Enterprise Service to Apply Configuration Changes

    A Confirmation modal window appears.

  9. Click Confirm Restart All to restart all Arcadia Enterprise services.

    confirming to restart all Arcadia Enterprise services
    Confirm to Restart Arcadia Enterprise Service

    A progress modal window appears.

  10. In the Background Operation Running modal window, click Ok to close the interface. You do not need to wait for the process to complete.

    clicking OK to close the background operation running interface
    Closing the Background Operation Running Interface

After Arcadia Enterprise service successfully restarts, LDAP is set up successfully.