Configuring LDAP authentication

April 11, 2024

ID 196751

Kaspersky CyberTrace supports LDAP user authentication to allow user authentication in Kaspersky CyberTrace Web under his or her domain account. This section explains how to configure this type of authentication. For LDAP connection settings parameters, see the configuration reference.

Kaspersky CyberTrace supports the use of Active Directory® only if the domain controller is running Windows. The use of Active Directory with Linux-based domain controllers is possible, but not guaranteed.

The root certificate of the Active Directory server should be located in the system store of the operating system where Kaspersky CyberTrace is installed.

The LDAP section allows you to perform the following actions:

  • Enable LDAP authentication
  • Specify connection settings
  • Test the connection to the LDAP server
  • Configure accounts filtering

Enabling LDAP authentication

To enable LDAP authentication,

Click the LDAP is on toggle button.

The LDAP server will now be used for user authentication.

When LDAP authentication is enabled, you still can interact with Kaspersky CyberTrace under a local user account.

Connection settings

In the Connection settings section of the LDAP tab, you can specify the following settings:

  • IP address or FQDN (fully qualified domain name) and port of the LDAP server

    Use the global catalog ports to connect to the LDAP server: port 3268 for StartTLS, as well as for connection without encryption; and port 3269 for TLS.

  • SSL-secured connection

    You can enable the use of a secure connection to the LDAP server by selecting SSL/TLS or STARTTLS by using Kaspersky CyberTrace Web. The SSL/TLS protocol is selected by default.

    On Linux, when connecting to LDAP server, Kaspersky CyberTrace verifies the certificates.

    The folder with certificates /etc/ssl/certs contains symbolic link to the root certificate. The name of the link contains hash of the certificate.

    If running on Linux deb, the certificate name format is set by the update-ca-certificates utility.

    If running on Linux rpm, the certificate name format is set manually by the user with the openssl x509 -in YOUR_CERT_FILE -hash –noout command.

    If secure connection is enabled, Kaspersky CyberTrace uses certificates from /etc/ssl/certs to authenticate the LDAP server.

  • Path to the LDAP database

    The path to the database containing user accounts that can access Kaspersky CyberTrace.

Testing the connection to the LDAP server

Go through the procedure below to make sure that a connection to the LDAP server is established.

To test the connection to the LDAP server:

  1. Click the Test connection with LDAP link.

    The Test connection with LDAP window opens.

  2. Specify the following settings:
    • User name for test connection
    • User password for test connection
  3. Click Test.

A connection test can be performed only if you specified all the necessary settings for connecting to the server.

Accounts filtering

The Accounts filtering section contains filtering rules for administrator and analyst accounts.

You can configure the following properties:

  • Account format

    You can select one of two formats:

    • User Principal Name

      If this option is selected, users must provide a user name that is not an email address when performing authentication (for example user, but not user@domain.com).

    • SAM Account Name

      If this option is selected, users must provide a user name in the following format when performing authentication: Domain\User.

  • Administrator accounts filter

    The filter for LDAP user accounts that defines which users must be assigned the Administrator role depending on their common name in Active Directory.

    If this value is not specified, all users who login using LDAP authentication and pass the analyst account filter will be assigned the Analyst role.

  • Analyst account filter

    The filter for LDAP user accounts that defines which users must be assigned the Analyst role depending on their common name in Active Directory.

    If this value is not specified, all users who login using LDAP authentication and do not pass the administrator account filter will be assigned the Analyst role.

    As an example, in the figure below the filters are configured so that the users who are members of the Admins group will be assigned the Administrator role, and the users who are members of either the Operators or the Analysts group will be assigned the Analyst role.

    Example of accounts filters in Cybertrace.

    Example of accounts filters

If the AdministratorAccountsFilter and AnalystAccountsFilter elements of the kl_feed_service.conf file contain values, and the user that is trying to log in is not included in any of the specified groups, Kaspersky CyberTrace will return an error and deny access to the web user interface for this user.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.