Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Configuring authentication servers used for managing remote users

Configuring authentication servers

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • EcoStruxure IT Help Center
  • EcoStruxure IT Help Center Categories
  • IT Advisor
  • ITA web client
  • Configuring authentication servers
  • Configuring authentication servers used for managing remote users
Options
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close

Related Forums

  • EcoStruxure IT forum

  • APC UPS Data Center & Enterprise Solutions Forum

Previous Next

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite

EcoStruxure IT Support

Submit a support request for additional assistance with EcoStruxure IT software.

Request Support
Back to Configuring authentication servers
Options
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content
0 Likes
1613 Views

Link copied. Please paste this link to share this article on your social media post.

Trying to translate this page to your language?
Select your language from the translate dropdown in the upper right. arrow
Translate to: English
  • (Français) French
  • (Deutsche) German
  • (Italiano) Italian
  • (Português) Portuguese
  • (Русский) Russian
  • (Español) Spanish

Configuring authentication servers used for managing remote users

Picard EcoStruxureIT
‎2019-11-05 08:16 AM

Configuring authentication servers in the ITA web client provides access to ITA for remote users provided they have been authenticated by the configured authentication server.

About remote users, certificates, and authentication methods

When a remote user attempts to log on to the ITA server, the credentials are sent to the authentication server associated with that user. It is that server, and not the ITA server, that authenticates the logon attempt.

Note

If you use SSL, ensure there’s at least one local user on the ITA server so you’ll be able to log in and accept new SSL certificates from authentication servers when the current ones expire. 

This is necessary because when a certificate expires for an AD, LDAP, or DCE server used for authenticating remote users in ITA, the ITA server will no longer be able to verify that the logon attempts come from a trusted server, and therefore will not allow any of these users to log in.  

Log in as a local user on the ITA server and trust the new certificate from the AD, LDAP, or DCE server to reenable authentication.

See more about working with SSL certificates here.

Configuring remote user authentication

  1. In Configuration > Authentication Servers, click to add an authentication server. 

  2. Enter authentication server settings, starting with predefined authentication method from the drop-down list. 
    The name, email address, and password data is supplied by the authentication server.

When you are setting up a remote user, user information is stored on:

  • Data Center Expert server as a remote repository with user information. The IT Advisor server requires connection setup to the Data Center Expert server in order to obtain the user information.
  • LDAP or Active Directory server. The IT Advisor server requires connection setup to the server and logon information is required.

When a remote user attempts to log on to the IT Advisor server, the user credentials (user name and password) are sent to the authentication server associated with that user. It is that server, and not the IT Advisor server, that authenticates the logon attempt.

Indirect AD authentication (via DCE) is not recommended.

LDAP and Active Directory specifications

  • Support for LDAPv3, both ldaps:// and ldap:// 
  • ITA's Active Directory integration supports mutual trust between child and parent Domain Controllers (Active Directory servers)
    • mutual trust allows the user which authenticates an Active Directory server to authenticate against a parent or child Domain controller of your Active Directory server.
    • The username of a user that has access to reading users and groups from the authentication server can, because of mutual trust, be defined with the child domain name as part of the username. Example: username@child-domain or username@child-domain.domain
    • How-to setup an Active Directory server: Set up AD server
  • The operations done are only read operations on the following fields: cn, uid, mail
  • You can import individual users or user groups from a remote authentication server.
    Users in groups are automatically added to ITA and will appear in the user interface. Users are not automatically deleted, however, permissions are removed if a user is removed from a group.
  • Tested and verified OS versions for Enterprise Active Directory:
    • Windows OS: Windows Server 2008 R2 SP1 and  2012 SP1
    • Forest function level: Windows Server 2008 and 2012
    • Domain functional level: Windows Server 2008 and 2012

LDAP and Active Directory Limitations

  • Active Directory has an LDAP query limit of 1000 objects, to prevent excessive load and Denial of Service attacks
    • The default method to get around this limitation, is to break up the query to return at most 1000 objects at a time. For example, query only for objects starting with the letter a, then query for objects starting with the letter b and so forth.
    • The more efficient method for large environments is to enable paging. Paging automatically splits the results into multiple result sets so the integration does not have to split up the query into multiple requests.
  • A more comprehensive list of limitations and work-arounds can be found here: LDAP policy in Active Directory

 

Was this article helpful? Yes No
No ratings

Link copied. Please paste this link to share this article on your social media post.

Didn't find what you are looking for? Ask our Experts
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of