PDF(196.1 KB) View with Adobe Reader on a variety of devices
ePub(285.7 KB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
Mobi (Kindle)(220.8 KB) View on Kindle device or Kindle app on multiple devices
Updated:November 20, 2020
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to import users from an Lightweight Directory Access Protocol (LDAP) directory. This allows end-users to Log in via Cisco web app with their own account to manage their spaces and join meetings.
Contributed by Jefferson Madriz and Octavio Miralrio, Cisco TAC Engineers.
Cisco recommends that you have knowledge of these topics:
CMS version 3
Application Programing Interface (API)
Note: Configure LDAP is optional and does not need to be completed if you only wish to enable Guest access. If you don't wish to enable user logins to web app, skip this task.
The information in this document is based on these software and hardware versions:
CMS version 3.0
Windows LDAP directory
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Meeting Server LDAP settings
LDAP Server Location/address: network IP address of the LDAP Server.
Name: a label to help identify objects in the API.
LDAP Username/Password: credentials used to connect to the LDAP server.
Port/portNumber: The network port to use when connecting to the LDAP server.
Secure: When enabled, connection uses secure LDAP.
Base Distinguished Name/baseDN: LDAP location where Meeting Server search for users.
Filter: Search filter that defines which LDAP objects to include in the search.
For each user matched by the above search settings, Meeting Server creates a user in Meeting Server with the Field Mapping expressions the administrator defines. The Mappings can use regex expressions and LDAP property names to construct results based on the imported user's LDAP values. The commonly used Field Mappings are:
Display Name/nameMapping: Name shown for the user in user searches and directories in Meeting Server.
Username/jidMapping: The username the user use to Log in via web app, the result must be unique for each user
Space Name/coSpaceNameMapping: Label given to the auto-generated space for that user
Space URI user part/coSpaceUriMapping: Defines the user portion of the Uniform Resource Identifier (URI) for the autogenerated space for that user, result must be unique for each user.
Space secondary URI user part/coSpaceSecondaryUriMapping: Defines a secondary URI for the auto-generated space for the user (optional). Usually used to assign a E164 style URI to the space, result must be unique for each user.
Space call ID/coSpaceCallIdMapping: Sets the call ID for the auto-generated space for the user (optional). If not defined, a random call ID is generated automatically, result must be unique for each user
For the simplified deployment example, in this example is shown import of all users from Active Directory. The import optionally supports creation of a personal space for each imported user. This configuration can be made wiith Webadmin, or API, it's not possible to have both configure at the same time.
Log in to the Meeting Server Webadmin interface
Navigate to Configuration > API.
Use the Filter input box, enter ldapServers to filter the list view.
Select the arrow next to the /api/v1/ldapServers object.
Click Create new to configure a new ldapServers object.
Enter the server values. Example values below must be updated to match your environment. address: 10.15.13.90 (or FQDN) name: MXC Users portNumber: 3268 username: CN=user1,OU=CMSusers,DC=mxc,DC=lab password: <Password for supplied user> secure: set to true
Click return to object list to return to the full list of API objects.
Use the Filter input box, enter ldapMappings to filter the list view.
Select the arrow next to /api/v1/ldapMappings.
Select Create new to configure a new ldapMappings object.
Configure the Field Mapping Expressions. These values can be customized to your deployment. The simplified deployment recommendation is to use the user’s email address for username (jidMapping) and to create spaces for all imported users.
jidMapping: $mail$ nameMapping: $cn$ coSpaceUriMapping: $sAMAccountName$.space coSpaceNameMapping: $cn$ space
Click return to object list to return to the full list of API objects.
Use the Filter input box, enter ldapSources to filter the list view.
Select the arrow next to /api/v1/ldapSources.
Select Create new to configure a new ldapSources object.
The server parameter must be set to the ID of the ldapServers object created in earlier steps.
The mapping parameter must be set to the ID of the ldapMappings object created in earlier steps.
Configure the baseDn and filter parameters. These values define the search performed in the LDAP server when users are imported.
baseDn OU=CMSusers,DC=mxc,DC=lab filter (&(objectCategory=person)(sAMAccountName=*))) or (&(sAMAccountType=805306368)(sAMAccountName=*)(mail=*))
Note: : If your directory has a large number of users (more than 10,000) or you do not want to enable all users, the Base distinguished name and Filter can be changed to target a more specific group or set of users. Consult this with your LDAP administrator.
The LDAP configuration to import users is now complete and ready for an LDAP sync to be run.
With the ldapServer, ldapMapping, and ldapSource objects created, the LDAP import/sync process must be run to import users. The sync process must be re-run anytime you want user changes in the LDAP server to be updated in Meeting Server.
Log in to the Meeting Server Webadmin interface.
Navigate to Configuration > Active Directory:
Select Sync Now at the bottom of the page.
Note: Sync Now can still be used even though the configuration on this page is not used.
After a minute or two, navigate to Status > Users which now displays the users created by the LDAP import.
Navigate to Configuration>Spaces and validate the spaces that were created for the imported users are displayed.
If the user list is empty, navigate to Logs > Event Log and locate the entries with LDAP sync operation. Any errors about attributes missing or duplicate entries means your Field Mappings or search criteria needs to be adjustd to avoid errors. If needed, you can use Configuration > API to modify any of the values you previously setup, then repeat the LDAP sync.