Last Update: 2024-11-01
Purpose
This article provides information on how to log in using the Lightweight Directory Access Protocol (LDAP).
Introduction
LDAP is a protocol that enables users to search for information about organizations, people, and so on. LDAP has two main purposes:
-
Store data in an LDAP directory and authenticate users who access the directory.
-
Provide the communication language that applications need to exchange information to directory services, which provide access to information about organizations, individuals, and other data on the Internet.
The most common use case for LDAP is to provide a central location for accessing and managing directory services. LDAP enables you to store, manage, and secure information about your organization, its users, and assets, such as usernames and passwords. This simplifies the access to systems by providing a hierarchical structure of information, and can be critical for corporations as they grow and acquire more user data and assets.
LDAP also functions as an Identity and Access Management (IAM) solution focused on user authentication, including support for Kerberos and Single sign-On (SSO), Simple Authentication Security Layer (SASL), and Secure Sockets Layer (SSL).
Log In Using LDAP
Requirements
-
An Active Directory (AD) authentication server is required within the customers network to integrate with.
-
Integration with the LDAP server has been setup within the HIAB system.
Logging in
-
Go to
https://<hiab-ip-address>/ -
Enter your username and password.
-
Press Login to be authenticated against the LDAP server.
-
After authentication you are logged in to the HIAB system.
Related Articles
- Reports
- Log In Using LDAP
- Report Library
- Vulnerability Database
- Removing an Agent from Windows
- Delta
- Scan Blueprint
- Technical Specification
- Schedules
- Installing a Linux Agent
- Workflows
- Troubleshooting checklists
- User Management
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- HIAB Deployment Guide
- Managing Tags
- Checking if Agent is Running
- Agent Installation Introduction
- Common Settings Panel
- Scanning Range
- Role Management
- Portal Icon List
- Agent Call Home
- Asset Discovery
- XML API Interface Technical Document
- Using the Agent Info Command
- Scheduled Reports
- Removing an Agent from Linux
- Solutions
- Identity and Access Management (IAM)
- Understanding Scanner and Scheduler
- Licensing Consumption
- Installing a macOS Agent
- Agent Introduction
- Setting Up an Agent Using System Proxy
- DNS Lookup in UI and in Console
- Supported Browsers
- HIAB Console
- Certificates
- Marking as False Positives
- Managing Agents
- Event Notification - Integration
- HIAB Distribution Settings
- Agent Latest Version
- Column Configuration
- PGP on User Accounts
- Event Notification - Use Cases
- Logging in to the Portal
- Firewall Rules
- Account
- Notification Settings
- Products Database
- Log In Using Single Sign-On (SSO)
- Scan Assessment Configuration
- View Templates
- Ports
- Installing a Windows Agent
- Generate Reports
- Basic Credentials
- Scan Stages
- Object Identifiers
- Subscriptions Overview
- Services
- REST API Interface Technical Document
- Getting Started with the Portal
- Scan Configuration Settings
- Scans View
- Retrieving a REST API Token From XMLAPI
- HIAB E-mail Whitelisting
- Scan Credentials
- API Examples
- Tags
- Accepting a Risk
- Importing Tags for AWS Discovery
- Discovery Scan Configuration
- Products
- Vulnerabilities
- Scan Policies
- Resource Group Management
- Download Agents
- Discussions and Commenting
- Filters
- Notifications
- 2FA on User Accounts
- Assets