
Documentation for Crowd 2.2. Documentation for other versions of Crowd is available too.
A Delegated Authentication directory combines the features of an internal Crowd directory with delegated LDAP authentication. This means that you can have your users authenticated via an external LDAP directory while managing the users, groups and roles in Crowd. You can use Crowd's flexible and simple group management when the LDAP groups do not suit your requirements. For example, you can set up a simple group configuration in Crowd for use with Confluence and other Atlassian products, while authenticating your users against the corporate LDAP directory. You can also avoid the performance issues which might result from downloading large numbers of groups from LDAP.
Important
Delegated Authentication directories do not allow you to browse the LDAP data. The directory delegates user authentication to LDAP, but to be able to list users and groups, you will need to add them to the directory. See more details in the Next Steps section of this page.
The diagram below gives a conceptual overview of delegated LDAP authentication. This example assumes that you have:
To configure a Delegated Authentication directory,
Screenshot 1: Directory details
Attribute |
Description |
|---|---|
Name |
The name used to identify the directory within Crowd. For example: 'Chicago Employees' or 'Web Customers'. |
Description |
More information about this directory. |
Active |
Only deselect this if you wish to prevent all users within the directory from accessing all mapped applications. If a directory is not marked as 'Active', it is inactive. Inactive directories:
|
Screenshot 2: Connector
Attribute |
Description |
|---|---|
Connector |
The directory connector to use when communicating with the directory server. |
URL |
The connection URL to use when connecting to the directory server, e.g.: |
Secure SSL |
Specifies whether the connection to the directory server is an SSL connection. |
Use Node Referrals |
Use the JNDI lookup java.naming.referral option. Generally needed for Active Directory servers configured without proper DNS, to prevent a 'javax.naming.PartialResultException: Unprocessed Continuation Reference(s)' error. |
Use Nested Groups |
Enable or disable support for nested groups on the LDAP user directory. |
Base DN |
Enter the root distinguished name to use when running queries versus the directory server, e.g.: |
User DN |
Distinguished name of the user that Crowd will use when connecting to the directory server. |
Password |
The password that Crowd will use when connecting to the directory server. |
We have shown the settings for Active Directory. For details about the settings for your specific directory server, please see:
Screenshot 3: Configuration
Attribute |
Description |
|---|---|
User DN |
This value is used in addition to the base DN (distinguished name) when searching and loading users. An example is |
User Object Class |
This is the name of the class used for the LDAP user object. An example is |
User Object Filter |
The filter to use when searching user objects. |
User Name Attribute |
The attribute field to use when loading the username. Examples are |
User Name RDN Attribute |
The RDN (relative distinguished name) to use when loading the username. An example is |
User First Name Attribute |
The attribute field to use when loading the user's first name. An example is |
User Last Name Attribute |
The attribute field to use when loading the user's last name. An example is |
User Display Name Attribute |
The attribute field to use when loading the user's full name. An example is |
User Email Attribute |
The attribute field to use when loading the user's email address. An example is |
User Group Attribute |
The attribute field to use when loading the user's groups. An example is |
User Password Attribute |
The attribute field to use when loading a user's password. An example is |
Please refer to the notes on LDAP object structures in the page about LDAP connectors.
Once you have configured the directory's permissions, you have finished configuring your new directory.
Next steps will be:
Same username required in Crowd and LDAP
The username must be the same in the Crowd Delegated Authentication directory and in the LDAP directory. Changing the username in LDAP will break the link to the Crowd Delegated Authentication directory.