Using Integrated Windows Authentication

This section describes a sample for using Integrated Windows Authentication with respect to Active Directory (AD).


To use Integrated Windows Authentication, configure the user’s externalUserName.
Also, assign an AD attribute value consisting of "(samAccountName) + '@' + (AD domain)" to externalUserName.


In this sample configuration, the AD userPrincipalName is assigned as the value of externalUserName for synchronization with the IIJ ID Service.

[ Reference ]

config.yml sample
log:
  loglevel:                      info
ad:
  ldap:
    server:
      addresses:
                                 - 127.0.0.1
      user:                      'CN=administrator,CN=Users,DC=example,DC=jp'
      encryption:                none
    base_dn:                     'DC=example,DC=jp'
    filter:
      user:                      'memberOf:1.2.840.113556.1.4.1941:=CN=IIJ ID Service User Group,OU=OU1,DC=example,DC=jp'
      group:                     'memberOf:1.2.840.113556.1.4.1941:=CN=IIJ ID Service User Group,OU=OU1,DC=example,DC=jp'
    cache_disabled:              true
iid:
  scim:
    http:
      proxy:
        use:                     true
        address:                 proxy.example.jp
        port:                    8080
        user:                    iij-taro
    attribute:
      user:
        default:
          emails:
            - primary:           true
          idTokenClaims:
            issuer:              (Issuer identifier of the upstream ID provider [example: https://asiif-000000000000a.iif.auth.iij.jp/op])
        ad_bind:
          externalId:            objectGUID
          userName:              userPrincipalName
          name:
            familyName:          sn
            givenName:           givenName
          localNames:
            familyName:          msDS-PhoneticLastName
            givenName:           msDS-PhoneticFirstName
          active:
                                 - userAccountControl
                                 - accountExpires
          externalUserName:      userPrincipalName
          emails:
            - value:             mail
      group:
        ad_bind:
          externalId:            objectGUID
          displayName:           name
          email:                 mail
secret.yml sample
ad:
  ldap:
    server:
      password:   ldap_password
iid:
  scim:
    token:        scim_token
    http:
      proxy:
        password: proxy_passwor