To create a new LDAP connection to Active Directory:
In the KUMA web interface, open Settings → LDAP server.
Select or create a tenant for which you want to create a LDAP connection.
The LDAP server integration by tenant window opens.
Click the Add connection button.
The Connection parameters window opens.
Add a secret containing the account credentials for connecting to the Active Directory server. To do so:
If you previously added a secret, in the Secret drop-down list, select the existing secret (with the credentials type).
The selected secret can be changed by clicking on the button.
If you want to create a new secret, click the button.
The Secret window opens.
In the Name (required) field, enter the name of the secret containing 1 to 128 Unicode characters.
In the User and Password (required) fields, enter the account credentials for connecting to the Active Directory server.
You can enter the user name in one of the following formats: <user name>@<domain> or <domain><user name>.
In the Description field, enter a description of up to 4,000 Unicode characters.
Click the Save button.
In the Name (required) field, enter the unique name of the LDAP connection.
The length of the string must be 1 to 128 Unicode characters.
In the URL (required) field, enter the address of the domain controller in the format <hostname or IP address of server>:<port>.
In case of server availability issues, you can specify multiple servers with domain controllers by separating them with commas. All of the specified servers must reside in the same domain.
If you want to use TLS encryption for the connection with the domain controller, select one of the following options from the Type drop-down list:
startTLS.
When the startTLS method is used, first it establishes an unencrypted connection over port 389, then it sends an encryption request. If the STARTTLS command ends with an error, the connection is terminated.
Text exchange protocol enhancement that lets you create an encrypted connection (TLS or SSL) directly over an ordinary TCP connection instead of opening a separate port for the encrypted connection.
Make sure that port 389 is open. Otherwise, a connection with the domain controller will be impossible.
LDAPS.
When using LDAPS, an encrypted connection is immediately established over port 636.
insecure.
When using an encrypted connection, it is impossible to specify an IP address as a URL.
If you enabled TLS encryption at the previous step, add a TLS certificate. You must use the certificate of the certification authority that signed the LDAP server certificate. You may not use custom certificates. To add a certificate:
If you previously uploaded a certificate, select it from the Certificate drop-down list.
If no certificate was previously added, the drop-down list shows No data.
If you want to upload a new certificate, click the button on the right of the Certificate list.
The Secret window opens.
In the Name field, enter the name that will be displayed in the list of certificates after the certificate is added.
Click the Upload certificate file button to add the file containing the Active Directory certificate. X.509 certificate public keys in Base64 are supported.
If necessary, provide any relevant information about the certificate in the Description field.
Click the Save button.
The certificate will be uploaded and displayed in the Certificate list.
In the Timeout in seconds field, indicate the amount of time to wait for a response from the domain controller server.
If multiple addresses are indicated in the URL field, KUMA will wait the specified number of seconds for a response from the first server. If no response is received during that time, the program will contact the next server, and so on. If none of the indicated servers responds during the specified amount of time, the connection will be terminated with an error.
In the Base DN field, enter the base distinguished name of the directory in which you need to run the search query.
Standard imported attributes from AD cannot be added as custom attributes. For example, if you add the standard accountExpires attribute as a custom attribute, KUMA returns an error when saving the connection settings.
The following account attributes can be requested from Active Directory:
accountExpires
badPasswordTime
cn
co
company
department
description
displayName
distinguishedName
division
employeeID
givenName
l
lastLogon
lastLogonTimestamp
Mail
mailNickname
managedObjects
manager
memberOf (this attribute can be used for search during correlation)
mobile
name
objectCategory
objectGUID (this attribute always requested from Active Directory even if a user doesn't specify it)
objectSID
physicalDeliveryOfficeName
pwdLastSet
sAMAccountName
sAMAccountType
sn
streetAddress
telephoneNumber
title
userAccountControl
UserPrincipalName
whenChanged
whenCreated
After you add custom attributes in the LDAP connection settings, the LDAP attribute to receive drop-down list in the collector automatically includes the new attributes. Custom attributes are identified by a question mark next to the attribute name. If you added the same attribute for multiple domains, the attribute is listed only once in the drop-down list. You can view the domains by moving your cursor over the question mark. Domain names are displayed as links. If you click a link, the domain is automatically added to LDAP accounts mapping if it was not previously added.
If you deleted a custom attribute in the LDAP connection settings, manually delete the row containing the attribute from the mapping table in the collector. Account attribute information in KUMA is updated each time you import accounts.
After the collector is restarted, KUMA begins enriching events with accounts.
Select the Disabled check box if you do not want to use this LDAP connection.
This check box is cleared by default.
Click the Save button.
The LDAP connection to Active Directory will be created and displayed in the LDAP server integration window.
Account information from Active Directory will be requested immediately after the connection is saved, and then it will be updated at the specified frequency.
If you want to use multiple LDAP connections simultaneously for one tenant, you need to make sure that the domain controller address indicated in each of these connections is unique. Otherwise KUMA lets you enable only one of these connections. When checking the domain controller address, the program does not check whether the port is unique.