IAM - LDAP Authentication to Active Directory and to eDirectory


Overview

Useful Links:

KB0014625 IAM - LDAP Authentication

KB0019418 All Michigan Medicine Approved Standards for Authentication

KB0014745 Identity and Access Management Services

KB0014349 IAM Developer Resources

 

Related Information

Introduction

Michigan Medicine (Identity and Access Management (IAM)) provides two options for resources (user accounts, system accounts, applications, processes, devices, etc.) to authenticate using LDAP (Lightweight Directory Access Protocol).

  • authenticate via ldap.ent.med.umich.edu based on eDirectory.
  • authenticate via umhs.med.umich.edu based on Active Directory.

 

Differences between the two:

ldap.ent.med.umich.edu is preferred due to better redundancy.

umhs.med.umich.edu may be necessary for applications that are required to use Active Directory LDAP; refer to your documentation to be sure. 

 

Options

Authenticating via eDir (ldap.ent.med.umich.edu)

Parameter

Pre-Prod

Prod

DNS Name

ldap.p-ent.med.umich.edu

ldap.ent.med.umich.edu

Base DN:

dc=med,dc=umich,dc=edu

dc=med,dc=umich,dc=edu

Base user DN:

ou=people,dc=med,dc=umich,dc=edu

ou=people,dc=med,dc=umich,dc=edu

Base group DN:

ou=groups,dc=med,dc=umich,dc=edu

ou=groups,dc=med,dc=umich,dc=edu

Port

636

636

Principle

cn = {System Account}

Contact Account Admin to have the account created and IDM to have appropriate rights set-up.

cn = {System Account}

Contact Account Admin to have the account created and IDM to have appropriate rights set-up.

SSL

Yes

Yes

 

 

Authenticating via Microsoft Active Directory (umhs.med.umich.edu)

Parameter

Pre-Prod

Prod

DNS Name

p-umhs.med.umich.edu

umhs..med.umich.edu

Base DN:

DC=p-umhs,DC=med,DC=umich,DC=edu

DC=umhs,DC=med,DC=umich,DC=edu

Base user DN:

CN=Users,DC=p-umhs,DC=med,DC=umich,DC=edu

CN=Users,DC=umhs,DC=med,DC=umich,DC=edu

Base group DN:

OU=UMHS Groups,DC=p-umhs,DC=med,DC=umich,DC=edu

OU=UMHS Groups,DC=p-umhs,DC=med,DC=umich,DC=edu

Port

636

636

Principle

cn = {System Account}

Contact Account Admin to have the account created and IDM to have appropriate rights set-up.

cn = {System Account}

Contact Account Admin to have the account created and IDM to have appropriate rights set-up.

SSL

Yes

Yes

 

As of 22 March 2023, resources must employ LDAP channel binding and signing per CHG0152788  (LDAP channel binding and LDAP signing provide ways to increase the security for communications between LDAP clients and Active Directory domain controllers.  This change is necessary to meet Information Assurance cyber security standards and requirements:  unsigned network traffic is susceptible to replay and Man-in-the-Middle attacks.  

Resources that are built on .NET Framework, Active Directory Service Interfaces (ADSI), or make LDAP calls into WLDAP32  will automatically handle LDAP signing and channel binding.    

Resources that rely on unsigned SASL (Negotiate, Kerberos, NTLM, or Digest) LDAP binds or on LDAP simple binds over a non-SSL/TLS connection could fail to authenticate.  Please check your documentation or vendor for non- windows device O/S, service, and applications.

To be certain about whether or not your resource will successfully authenticate via Microsoft Active Directory (umhs.med.umich.edu), the best course of action is to test in pre-prod (p-umhs.med.umich.edu:636).