Version 7.2 239 Mediant 1000B Gateway & E-SBC
User's Manual 15. Services
sAMAccountName that equals "SueM".
Attribute (e.g., "memberOf") to return from objects that match the filter criteria:
The attribute is configured by the 'Management Attribute' parameter in the LDAP
Servers table (see ''Configuring LDAP Servers'' on page
234).
Therefore, the LDAP response includes only the groups of which the specific user is a
member.
Note:
• The search filter is applicable only to LDAP-based login authentication and
authorization queries.
• The search filter is a global setting that applies to all LDAP-based login
authentication and authorization queries, across all configured LDAP servers.
To configure the LDAP search filter for management users:
1. Open the Authentication Server page (Setup menu > Administration tab > Web &
CLI folder > Authentication Server).
Figure 15-21: Configuring LDAP Search Filter
2. In the 'LDAP Authentication Filter' parameter, enter the LDAP search filter attribute for
searching the login username for user authentication.
3. Click Apply.
15.3.7 Configuring Access Level per Management Groups Attributes
The Management LDAP Groups table lets you configure LDAP group objects and their
corresponding management user access level. The table is a "child" of the LDAP Servers
table (see ''Configuring LDAP Servers'' on page 234) and configuration is done per LDAP
server. For each LDAP server, you can configure up to three table row entries of LDAP
group(s) and their corresponding access level.
Note:
• The Management LDAP Groups table is applicable only to LDAP-based login
authentication and authorization queries.
• If the LDAP response received by the device includes multiple groups of which the
user is a member and you have configured different access levels for some of
these groups, the device assigns the user the highest access level. For example, if
the user is a member of two groups where one has access level "Monitor" and the
other "Administrator", the device assigns the user the "Administrator" access level.
• When the access level is unknown, the device assigns the default access level to
the user, configured by the 'Default Access Level' parameter as used also for
RADIUS (see ''Configuring RADIUS-based User Authentication'' on page 227).
This can occur in the following scenarios:
√ The user is not a member of any group.
√ The group of which the user is a member is not configured on the device (as
described in this section).
√ The device is not configured to query the LDAP server for a management
attribute (see ''Configuring LDAP Servers'' on page 234).