Switch to MS Active Directory
- From User Console Home menu, click Administration, then select Authentication from the left. The Authentication interface appears. Local - Use basic Pentaho Authentication is selected by default.
- Choose the External - Use LDAP / Active Directory server radio button. The LDAP Server Connection fields populate with a default URL, user name, and password.
- Change the Server URL, User Name, and Password as needed.
- Click Test Server Connection to verify the connection to your server and to complete the set up.
- Click the Browse buttons to select the Pentaho System Administrator user and role to match your configuration. Click OK. The text box auto-populates with the selected values.
- For MSAD, choose Custom Configuration.
- For Users:
- Search Base by entering the path where your users are located. Example:
CN=Users,DC=MyDomain,DC=com
- Search Filter by entering in the attribute that users will login with. Example:
(sAMAccountName={0})
- Search Base by entering the path where your users are located. Example:
- For Roles:
- For Role Attributes, enter in the Attribute that is used for roles/groups. Example:
CN
- For a Role Search Filter, enter in the ObjectClass that defines that these are roles or groups. Example:
(&(objectClass=group)(CN=Pentaho*))
- For Role Search Base, enter in the path where your roles or groups are located. Example:
OU=groups,DC=MyDOmain,DC=com
- Click Test.
- For Role Attributes, enter in the Attribute that is used for roles/groups. Example:
- For Populator:
- For Group Role Attribute, enter in the Attribute that is used for groups. Example:
CN
- For Group Search Base, enter in the path to where your groups are located. Example:
OU=groups,DC=MyDOmain,DC=com
- Set the Group Search Filter to
(member:1.2.840.113556.1.4.1941:={0})
You can set a Role Prefix if you need one to filter by.
- For Group Role Attribute, enter in the Attribute that is used for groups. Example:
- Click Test, then click Save.
- Shut down the Pentaho Server.
- Locate these three files and modify the settings as noted.
- Navigate to the pentaho-solutions/system directory, and open the
repository.spring.properties
file with a text editor. Find these two sections and edit them to match your Active Directory settings, then save and close the file.singleTenantAdminUserName=admin
singleTenantAdminAuthorityName=Administrator
- In the pentaho-solutions/system directory, open the pentaho.xml file with a text editor. Find this section and edit it to match your Active Directory settings, then save and close the file.
<acl-voter> <admin-role>Administrator</admin-role> </acl-voter>
- Navigate to the pentaho-solutions/system/data-access directory, and open the
settings.xml
file with a text editor. Find these two sections and edit them to match your Active Directory settings, then save and close the file.<data-access-roles>Administrator</data-access-roles>
<data-access-view-roles>Authenticated,Administrator</data-access-view-roles>
- Navigate to the pentaho-solutions/system directory, and open the
- Restart the Pentaho Server.
The Pentaho Server is now configured to authenticate users against your MSAD server.