Kaspersky CyberTrace supports LDAP user authentication to allow user authentication in Kaspersky CyberTrace Web under his or her domain account. This section explains how to configure this type of authentication.
Kaspersky CyberTrace supports the use of Active Directory® only if the domain controller is running Windows. The use of Active Directory with Linux-based domain controllers is possible, but not guaranteed.
The root certificate of the Active Directory server should be located in the system store of the operating system where Kaspersky CyberTrace is installed.
The LDAP section allows you to perform the following actions:
Enabling LDAP authentication
To enable LDAP authentication,
Enable the LDAP is on toggle switch.
The LDAP server will now be used for user authentication.
When LDAP authentication is enabled, you still can interact with Kaspersky CyberTrace under a local user account.
Connection settings
In the Connection settings section of the LDAP tab, you can specify the following settings:
Use the global catalog ports to connect to the LDAP server: port 3268 for StartTLS as well as for connection without encryption, and port 3269 for TLS.
This setting is stored in the AuthenticationServer > ConnectionString
element of the kl_feed_service.conf file.
You can enable the use of a secure connection to the LDAP server by using Kaspersky CyberTrace Web.
This setting is stored in the useEncryption
attribute of the AuthenticationServer > ConnectionString
element of the kl_feed_service.conf file.
On Linux, if secure connection is enabled, Kaspersky CyberTrace uses certificates from /etc/ssl/certs
to authenticate the LDAP server.
The path to the database containing user accounts that can access Kaspersky CyberTrace.
Testing the connection to the LDAP server
Go through the procedure below to make sure that a connection to the LDAP server is established.
To test the connection to the LDAP server:
The Test connection with LDAP window opens.
A connection test can be performed only if you specified all the necessary settings for connecting to the server.
Accounts filtering
The Accounts filtering section contains filtering rules for administrator and analyst accounts.
You can configure the following properties:
You can select one of two formats:
If this option is selected, users must provide a user name that is not an email address when performing authentication (for example user, but not user@domain.com).
If this option is selected, users must provide a user name in the following format when performing authentication: Domain\User.
The filter for LDAP user accounts that defines which users must be assigned the Administrator role depending on their common name in Active Directory.
If this value is not specified, all users who login using LDAP authentication and pass the analyst account filter will be assigned the Analyst role.
This setting is stored in the AuthenticationServers > AdministratorAccountsFilter
element of the kl_feed_service.conf file.
The filter for LDAP user accounts that defines which users must be assigned the Analyst role depending on their common name in Active Directory.
If this value is not specified, all users who login using LDAP authentication and do not pass the administrator account filter will be assigned the Analyst role.
This setting is stored in the AuthenticationServers > AnalystAccountsFilter
element of the kl_feed_service.conf file.
As an example, in the figure below the filters are configured so that the users who are members of the Admins
group will be assigned the Administrator role, and the users who are members of either the Operators
or the Analysts
group will be assigned the Analyst role.
Example of accounts filters
If the AdministratorAccountsFilter
and AnalystAccountsFilter
elements of the kl_feed_service.conf file contain values, and the user that is trying to log in is not included in any of the specified groups, Kaspersky CyberTrace will return an error and deny access to the web user interface for this user.