Importing Local Users from LDAP

You can configure local users on the firewall by retrieving the user names from your LDAP server. Having users on the firewall with the same name as existing LDAP/AD users allows SonicWALL user privileges to be granted upon successful LDAP authentication.

The list of users read from the LDAP server can be quite long, and you will probably only want to import a small number of them. A Remove from list button is provided, along with several methods of selecting unwanted users.You can use these options to reduce the list to a manageable size and then select the users to import.

To import users from the LDAP server:
1
Navigate to the Users > Settings page.

2
Set the User authentication method to LDAP or LDAP + Local Users. The Configure LDAP button moves up.

3
Click the Configure LDAP button. The LDAP Configuration dialog displays.

4
In the Settings tab, configure these server options:
a
b
Enter the port number of the LDAP server in the Port Number field; the default is 636.
Choose a port from the Standard port choices… drop-down menu:

If you choose a port from the Standard port choices… drop-down menu, the port number changes to that of the specified choice.

c
d
Enter a maximum time to spend on any auto operation in the Overall operation timeout (minutes) field. The default is 5 minutes.
5
Anonymous login (default)
Bind distinguished name (binds the distinguished name to the LDAP server
6
Give login name/location in tree, the Login user name and Login password fields become active.

a
Enter the name that is in the first component of the user’s distinguished name and not their login ID in the Login user name field. For example, John Doe may normally log in as jdoe, but you would enter John Doe in the field.
b
c
Bind distinguished name, the fields change.

a
b
7
Select which protocol version to use from the Protocol version drop-down menu:
LDAP version 3 (default)
8
To enable TLS mode, ensure the Use TLS (SSL) checkbox is selected. It is enabled by default.
9
10
To require valid certificates from the LDAP server in TLS mode, ensure the Require valid certificate from server checkbox is selected. It is enabled by default.
11
Optionally, select a local certificate for TLS from the Local certificate for TLS drop-down menu. The default is None.
12
Click the Schema tab.
Schema tab

1
In the LDAP Schema section, select a schema from the LDAP schema drop-down menu:
NOTE: What options are available and which are dimmed (unavailable) in the User Objects and User Group Objects sections change according to the schema you choose.
2
If you selected User defined schema, enter an object class in the Object class field. The default is user. These are the default values for the other schemas and cannot be changed:
Samba SMB – sambaSAMAccount
NovelleDirectory – inetOrgPerson
3
If you selected User defined schema, enter a login name attribute in the Login name attribute field. The default is on. These are the default values for the other schemas and cannot be changed:
4
Optionally, in the Qualified login name attribute, specify an attribute of a user object that sets an alternative login name of the user in name@domain format. This may be needed with multiple domains in particular, where the simple login name may not be unique across domains. These are the default values:
NOTE: With Active Directory, this would normally be userPrincipalName for login using name@domain, but could be set to mail to enable login by email address.
5
If you selected User defined schema, enter a user group-membership attribute in the User group membership attribute field. There is no default. These are the default values for the other schemas and cannot be changed:
6
Optionally, specify an additional user ID group attribute in the Additional user group ID attribute field and select the Use checkbox to enable the attribute’s use. The Additional user group ID attribute, along with the Additional user group match attribute in the User Group Objects section, allow for a schema that may set additional memberships for a user in addition to those that are found via a member and/or memberOf attributes; for example, Active Directory’s group attribute.

If the Additional user group ID attribute is specified and its use is enabled, then when a user object is found with one or more instances of this attribute, a search for additional user groups matching those attributes will be made in the LDAP directory. If a group is found with the Additional user group match attribute set to that value, then the user is also made a member of that group.

With Active Directory, this value, along with the Additional user group match attribute value, gives users membership in their primary user group (typically, Domain Users).

7
In the LDAP Import Users dialog, you can select individual users or select all users. To select all users in the list, select the Select/deselect all checkbox at the top of the list. To clear all selections, click it again.

8
To remove certain users on the basis of name, description, or location, select the Any user whose <field1> contains <field2> radio button. Select name, description, or location from the Any user whose drop-down menu and type the value to match in the contains field.

In this option, name refers to the user name displayed in the left column of the list, description refers to the description displayed to its right (not present for all users), and location refers to the location of the user object in the LDAP directory. The location, along with the full user name, is displayed by a mouse-over on a user name, as shown in the image above.

For example, you might want to remove accounts that are marked as “Disabled” in their descriptions. In this case, select description in the first field and type Disabled in the second field. The second field is case-sensitive, so if you typed disabled you would prune out a different set of users.

To remove certain users from the list on the basis of their location in the LDAP directory, select the All users <drop-down-menu1> <drop-down-menu2> radio button. From the first drop-down menu, select either at or at or under. From the second drop-down menu, select the LDAP directory location.
9
10
To undo all changes made to the list of users, click Undo. A confirmation message displays.
11
Click OK in the confirmation message.
12
When finished pruning out as many unwanted accounts as possible with the Remove from list options, use the checkboxes in the list to select the accounts to import.
13
Click Save selected.