Latest version: v2.1.1 Compatible with Fusion version: 5.9.1 and laterThe LDAP ACLs V2 connector indexes access control lists (ACLs) from an LDAP directory. It is used by other content connectors to enable security trimming so users can only search and access content they’re authorized to see. The LDAP ACLs V2 connector is useful in environments where content sources such as SharePoint or Google Cloud Storage have ACLs that reference LDAP group or user identities. To enable Fusion to enforce those ACLs at query time, the LDAP ACLs V2 connector first connects to an LDAP directory such as Active Directory, OpenLDAP, or another LDAP-compliant server to ingest user and group membership information. The connector then maps those users and groups to document-level ACLs indexed by other connectors for security trimming.
Verify your connector versionThis connector depends on specific Fusion versions. See the following table for the required versions:
For connector downloads, see Download Connectors.
Fusion version | Connector version |
---|---|
Fusion 5.6.1 and later | v1.0.0 and later |
Fusion 5.9.0 and later | v1.5.0 and later |
Fusion 5.9.1 and later | v2.0.0 and later |
Pod limitThe LDAP ACLs V2 connector does not support running multiple instances. Don’t run the connector on more than one pod.
Prerequisites
Perform these prerequisites to ensure the connector can reliably access, crawl, and index your data. Proper setup helps avoid configuration or permission errors, so use the following guidelines to keep your content available for discovery and search in Fusion. The LDAP server must use a supported authentication method:- Simple bind with a username and password.
- (Optional) Anonymous bind for open LDAP servers, but this is discouraged in production environments for security reasons.
- For users: Have access for
uid
,cn
,sAMAccountName
, or an equivalent for the unique user ID. - For groups: Have access for
cn
or equivalent for group ID, plusmember
, oruniqueMember
for users or subgroups assigned to that group.
User.Read.All
to read profile properties and group memberships.GroupMember.Read.All
to read memberships and basic group properties.
Remote mode prerequisites (optional)
If running in remote mode, there are additional considerations:- Ensure your network allows outbound HTTP/2 traffic from the remote host to the Fusion gRPC endpoint.
- You need a Fusion user account with the
remote-connectors
oradmin
role to authenticate the connector. - If the standalone host doesn’t trust Fusion’s TLS cert, point it to your truststore file path.
Authentication
Setting up the correct authentication according to your organization’s data governance policies helps keep sensitive data secure while allowing authorized indexing. You will need to enter the following in Fusion:- LDAP host and port.
- Bind DN username for the Login User Principal field in Fusion.
- Bind password for the Login Password in Fusion.
- Base DN, such as
dc=example,dc=com
. - User and group filters are prepopulated and you can adjust these as needed.
- If crawling Azure AD, enter the Azure credentials in the Azure AD Properties section.
- Bind to the LDAP server.
- Search users and groups.
- Fetch ACL data for security trimming.
Full recrawls
Starting in Fusion 5.7, subsequent crawls work differently with the LDAP ACLs V2 connector than other connectors. Crawls follow this process:- Every time the connector crawl runs, all documents are indexed.
- Each document is assigned a new field,
_lw_job_id_s
. - The connector job assigns the
jobID
value to this field. - When the crawl finishes, the job deletes documents that do not have the latest
jobID
value.
Remote connectors
You can configure the LDAP ACLs V2 connector (v2.0.0 and later) to running remotely in Fusion versions 5.9.1 and later.Configure Remote V2 Connectors
Configure Remote V2 Connectors
If you need to index data from behind a firewall, you can configure a V2 connector to run remotely on-premises using TLS-enabled gRPC.The gRPC connector backend is not supported in Fusion environments deployed on AWS.The
Prerequisites
Before you can set up an on-prem V2 connector, you must configure the egress from your network to allow HTTP/2 communication into the Fusion cloud. You can use a forward proxy server to act as an intermediary between the connector and Fusion.The following is required to run V2 connectors remotely:- The plugin zip file and the connector-plugin-standalone JAR.
- A configured connector backend gRPC endpoint.
- Username and password of a user with a
remote-connectors
oradmin
role. - If the host where the remote connector is running is not configured to trust the server’s TLS certificate, you must configure the file path of the trust certificate collection.
If your version of Fusion doesn’t have the
remote-connectors
role by default, you can create one. No API or UI permissions are required for the role.Connector compatibility
Only V2 connectors are able to run remotely on-premises. You also need the remote connector client JAR file that matches your Fusion version. You can download the latest files at V2 Connectors Downloads.Whenever you upgrade Fusion, you must also update your remote connectors to match the new version of Fusion.
System requirements
The following is required for the on-prem host of the remote connector:- (Fusion 5.9.0-5.9.10) JVM version 11
- (Fusion 5.9.11) JVM version 17
- Minimum of 2 CPUs
- 4GB Memory
Enable backend ingress
In yourvalues.yaml
file, configure this section as needed:-
Set
enabled
totrue
to enable the backend ingress. -
Set
pathtype
toPrefix
orExact
. -
Set
path
to the path where the backend will be available. -
Set
host
to the host where the backend will be available. -
In Fusion 5.9.6 only, you can set
ingressClassName
to one of the following:nginx
for Nginx Ingress Controlleralb
for AWS Application Load Balancer (ALB)
-
Configure TLS and certificates according to your CA’s procedures and policies.
TLS must be enabled in order to use AWS ALB for ingress.
Connector configuration example
Minimal example
Logback XML configuration file example
Run the remote connector
logging.config
property is optional. If not set, logging messages are sent to the console.Test communication
You can run the connector in communication testing mode. This mode tests the communication with the backend without running the plugin, reports the result, and exits.Encryption
In a deployment, communication to the connector’s backend server is encrypted using TLS. You should only run this configuration without TLS in a testing scenario. To disable TLS, setplain-text
to true
.Egress and proxy server configuration
One of the methods you can use to allow outbound communication from behind a firewall is a proxy server. You can configure a proxy server to allow certain communication traffic while blocking unauthorized communication. If you use a proxy server at the site where the connector is running, you must configure the following properties:- Host. The hosts where the proxy server is running.
- Port. The port the proxy server is listening to for communication requests.
- Credentials. Optional proxy server user and password.
Password encryption
If you use a login name and password in your configuration, run the following utility to encrypt the password:- Enter a user name and password in the connector configuration YAML.
-
Run the standalone JAR with this property:
- Retrieve the encrypted passwords from the log that is created.
- Replace the clear password in the configuration YAML with the encrypted password.
Connector restart (5.7 and earlier)
The connector will shut down automatically whenever the connection to the server is disrupted, to prevent it from getting into a bad state. Communication disruption can happen, for example, when the server running in theconnectors-backend
pod shuts down and is replaced by a new pod. Once the connector shuts down, connector configuration and job execution are disabled. To prevent that from happening, you should restart the connector as soon as possible.You can use Linux scripts and utilities to restart the connector automatically, such as Monit.Recoverable bridge (5.8 and later)
If communication to the remote connector is disrupted, the connector will try to recover communication and gRPC calls. By default, six attempts will be made to recover each gRPC call. The number of attempts can be configured with themax-grpc-retries
bridge parameters.Job expiration duration (5.9.5 only)
The timeout value for irresponsive backend jobs can be configured with thejob-expiration-duration-seconds
parameter. The default value is 120
seconds.Use the remote connector
Once the connector is running, it is available in the Datasources dropdown. If the standalone connector terminates, it disappears from the list of available connectors. Once it is re-run, it is available again and configured connector instances will not get lost.Enable asynchronous parsing (5.9 and later)
To separate document crawling from document parsing, enable Tika Asynchronous Parsing on remote V2 connectors.Security trimming
Starting in Fusion 5.9, you can configure the LDAP ACLs V2 connector with the SharePoint Optimized V2 connector to support security trimming.Configure Security Trimming for SharePoint Optimized V2
Configure Security Trimming for SharePoint Optimized V2
Configuration
When entering configuration values in the UI, use unescaped characters, such as
\t
for the tab character. When entering configuration values in the API, use escaped characters, such as \\t
for the tab character.