Authentication configuration
Configure the authentication mode that your clients use.
Read time 5 minutesLast updated 21 days ago
Use the authentication section of the server administration console to configure the authentication mode that your Unity Version Control (UVCS) clients use. A UVCS client communicates security information to the server for validation. The basic token sent from client to server is called SEID, short for SEcurity IDentifier. The following connectors are based on different ways to build the SEID and obtain users. UVCS can use the following connectors to retrieve its user information: You can also change the authentication mode when you need to.
Local name
In the Local name mode, the UVCS server reads the local users' names from the machine it runs on. On startup, the UVCS server creates a list of known users and recalculates the list periodically. For the system to work correctly, you need to configure the UVCS clients to also use the Local Users mechanism. The client takes the name of its logged-on user and sends it to the server. This is the name that the server uses to check whether it is a known user, and then make security calculations. This system relies on the correct network configuration. You can use this mode on secured networks to configure a mixed Unix /Windows environment, depending, for example, on a NIS+ system. You can also use this mode to configure access from the Internet, provided that the server only allows trusted clients to connect.- The server retrieves the user list from the local machine users (both Unix and Windows operating systems). The server takes the current user for a Windows machine inside a domain if it’s not a local user.
- The server builds the SEID with the user name.
Name and ID
Name and ID mode is identical to the Local name mode except it also uses the user ID.- The server retrieves the user list from the local machine users (both Unix and Windows operating systems). The server takes the current user for a Windows machine inside a domain if it’s not a local user.
- The server builds the SEID with the user name and ID (user ID on Linux and SID on Windows).
LDAP
The LDAP security configuration mechanism allows interoperability with an LDAP environment.- The server obtains the user list from the LDAP server using a given user and password.
- The server builds the SEID with the ID used by the concrete LDAP mechanism.
- Timeout for the LDAP requests: The UVCS server can set a timeout for the LDAP requests (time in seconds). To set a timeout, use the setting. For example:
LdapTimeoutSeconds.<LdapTimeoutSeconds>10</LdapTimeoutSeconds> - LDAP token expiration time: To configure the LDAP token expiration time, use the setting. To set any expiration time, use the format
LdapTokenExpirationTimeSpan. By default, the expiration time is 1 hour.[d.]hh:mm:ss: \ <LdapTokenExpirationTimeSpan>05:00:00</LdapTokenExpirationTimeSpan>
Override for LDAP user filter
Enter the following to specify the filter override:
For example, LDAP setups without the UID attribute can use the following filter:<LdapSettings> <MemberNameFilterOverride>_user_filter_</MemberNameFilterOverride></LdapSettings>
(|(sAMAccountName={user})(cn={user}))Active directory
With the Active Directory configuration mechanism, UVCS retrieves the user list from the current Active Directory main server and buils the SEID with a Windows SID. This authentication methods requires the server to run on Windows based operating systems. You can use Active Directory authentication in single domain or multi-domain environments. If you use UVCS in an Active Directory forest with multiple domains, you need to group usernames and groups that you enter in theDOMAIN\usernameDOMAIN\groupTime to reload users and groups
By default, the Plastic server reloads the users and groups information from the authentication provider every five minutes. In the server.conf file, you can configure theReloadUsersRefreshTimeSpan[d.]hh:mm:ss<ReloadUsersRefreshTimeSpan>01:00:00</ReloadUsersRefreshTimeSpan>Username and password
Username and password (UP) is the traditional authentication method, which allows you to define your own users and groups on the UVCS server. This method allows UVCS to work with an autonomous security mechanism. The UP mode can be the best option for many organizations that don't rely on systems like LDAP or Active Directory. The UVCS server obtains the list of users’ names from theusers.confgroups.conf- - Stores information about all the users and their encrypted passwords. The
users.conffile contains the definition of the users known to the system in user/password authentication mode. The format of theusers.conffile contains a list of the available users followed by their passwords. For example,users.confjohn:527bd5b5d689e2c32ae974c6229ff785 - - Stores all the available groups and the users they contain. The
groups.conffile has all the groups known to the Plastic system in user/password mode. The file is a list of the groups, each one followed by the names of the users or groups it contains. A group inside another group must be preceded by angroups.confsymbol. In the following example, the@group is inside thetestersgroup:developersdevelopers:john:charlie:mike:@testers
Configure the UP mode
To configure the UP mode, use one of the following tools:Use the Authentication configuration section from the UVCS Server Administration console
The User and password configuration section is a tool that you can use to configure theusers.confgroups.confUse the User management tool from the command line
umtool%serverinstalldir%/plasticd umtool help <command_name>%serverinstalldir%umtoolSubcommand name | Abbreviation | Description |
|---|---|---|
| | Add a new group into a group |
| | Add a new user into a group |
| | Change a user's password |
| | Create a new Plastic SCM group |
| | Create a new Plastic SCM user |
| | Show a command's help |
| | Show a list with current Plastic SCM groups |
| | Show a list with members of a group |
| | Show a list with current Plastic SCM users |
| | Delete an existing Plastic SCM group |
| | Delete a group from another group |
| | Delete an existing Plastic SCM user |
| | Delete a user from a group |
| | Rename an existing Plastic SCM group |
| | Rename an existing Plastic SCM user |
- Create a new user:
%serverinstalldir%/plasticd umtool cu maria - Create a new group:
%serverinstalldir%/plasticd umtool cg developers - Add a user to a group:
%serverinstalldir%/plasticd umtool addusertogroup maria developers
users.confgroups.conf