Solved

Help getting OpenFire to connect to Active Directory

Posted on 2013-06-24
3
2,457 Views
Last Modified: 2013-07-05
Hello All,

 
I'm having a terrible time getting OpenFire to connect to my Active Directory.  I have created a domain called ntdcctest.com.  My domain controller is named DC1.  I have renamed my administrator account to NICK.

 
In the profile settings of the setup, I'm using the following:

Server type = Active Directory

Host = dc1.ntdcctest.com

Port=389

Base DN = cn=users,dc=ntdcctest,dc=com

 
Administrator DN = cn=nick,cn=users,dc=ntdcctest,dc=com

Password = my password

 
When I test the settings, I don't get any error messages so I'm assuming the test was successful.

 
I get to the point where I have to add an administrator, and nothing I add here works. I have tried:

nick

ntdcctest\nick

cn=nick,cn=users,dc=ntdcctest,dc=com

nick@ntdcctest.com
 
I have verified my ldap users container is cn=users,dc=ntdcctest,dc=com using the powershell commandlet get-addomain

 
I have verified that distinguished name of my account is cn=nick,cn=users,dc=ntdcctest,dc=com using the powershell commandlet get-aduser nick.

 
Everything I have found on google and in the various postings indicates that cn=nick,cn=users,dc=ntdcctest,dc=com should be working.  What am I doing wrong here.  Any help would be greatly appreciated.

 
Thanks in advance,

Nick D.
0
Comment
Question by:ndalmolin_13
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 26

Accepted Solution

by:
Leon Fester earned 500 total points
ID: 39274040
What error do you get when you try to add your administrator?
Take the guess work out of the LDAP connection by using ldp.exe to test the connection.
It's available in the support kit.
http://technet.microsoft.com/en-us/library/cc772839(v=ws.10).aspx
0
 
LVL 9

Expert Comment

by:VirastaR
ID: 39274608
Hi,

According to LDAP Guide for OpenFire
http://www.igniterealtime.org/builds/openfire/docs/latest/documentation/ldap-guide.html

By default, Active Directory does not allow anonymous LDAP connections. Therefore, you'll need to enter the DN of a user that's allowed to connect to the server and read all user and group data. Unless you've created a special user account for this purpose, an easy choice is to use the built-in administrator account. By default, the administrator DN is in the form cn=Administrator,dc=<Your Domain>. Using our previous example, cn=Administrator,cn=users,dc=activedirectory,dc=jivesoftware,dc=com.

In your case:

cn=nick,cn=users,dc=ntdcctest,dc=com

This is the DN you are providing,there is nothing here in DN that makes LDAP understand that you are an administrator. Got it?

Easy choice is to use the built-in administrator account.

Hope that helps :)
0
 
LVL 1

Author Comment

by:ndalmolin_13
ID: 39276413
Hello All,

These are the settings that I got to work:

Server type = Active Directory

Host = dc1.ntdcctest.com

Port=389

Base DN = dc=ntdcctest,dc=com

When I added the administrator, I just used:  Nick
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question