Lucy Awareness
Visit our WebsiteContact Support
  • Wiki Overview
  • Guides
    • Quick Guides
      • Create Your First Campaign
        • Adding a New Client
        • Register an Attack Domain
        • Campaign Setup
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Whitelisting
    • Installing Lucy
      • On-Premise vs Cloud Installation
      • Architecture
      • Hardware Requirements
      • Network Communication
      • Installing Lucy
      • Post Installation
    • Manage Blacklisted Domains
      • Managing Google SafeBrowsing Alerts
    • Whitelisting a Lucy Server
      • Google Workspace Whitelisting
      • Microsoft O365 Whitelisting
      • File Attack Whitelisting
    • Attack Simulations
      • Attack Types
        • Data Entry Attack
        • Hyperlink Attack
        • File Attack
        • Portable Media
        • Smishing
        • Lures
        • QR Codes
        • Ransomware Emulation
        • Technical Malware Test
          • Malware Toolkit Test Suite
        • Mail & Web Filter Test
        • Email Spoofing Test
      • Attack Template Customization
      • Firewall Protection Interval
      • Email Tracking Technologies
      • Advanced Information Gathering
      • Regular Expressions in Login Fields
      • Copy a Website
      • Redirecting Users
    • Awareness Training
      • Awareness Template Customization
      • Awareness Only Campaigns
        • Using Multiple Awareness Trainings
      • Use extended method of tracking the end of the quiz
    • Reporting Plugin
      • Deploying Office 365
      • Deploying Outlook Native
      • Deploying Gmail
  • Application Screens Reference
    • Statistics Dashboard
    • Campaigns Dashboards
    • Campaigns
      • New Campaign
        • Wizard Mode
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Expert Mode
      • Campaign Settings
        • Configuration
          • Base Settings
          • Awareness Settings
          • Attack Settings
          • Schedule
            • Schedule Plan
          • Recipients
        • Advanced Settings
          • User Settings
          • Filters
          • Custom Fields
          • Reminders
        • Campaign Checks
        • Logs
        • Results
          • Summary
          • Statistics
          • Reports
          • Exports
    • Templates
      • Attack Templates
      • Awareness Templates
      • File Templates
      • Report Templates
      • Campaign Templates
      • Training Diploma
      • Download templates
      • Variables in Lucy
    • Users
      • Recipient Groups
      • End Users
      • End User Portal Settings
      • Administrative Users
      • Reputation Levels
    • Settings
      • Common System Settings
        • Domains
          • Supported TLDs
        • Firewall
        • Web Proxy
        • Mail Settings
        • SMTP Servers
        • SSL Settings
          • SSL for Campaigns
        • SMS Settings
        • Filter Settings
        • API Whitelist
        • LDAP Servers
          • LDAP Sync Tool
        • LDAP Settings
        • Azure Applications
        • Azure AD Settings
        • SSO Configuration
      • Advanced System Settings
        • Advanced Settings
        • SSH Password
      • Submitted Email Settings
        • Custom Rules & Score Factors
        • Abuse Reports
        • Incident Autoresponder
        • Plugin Settings
      • Clients
        • Client Invoices
        • Client Invoice Settings
      • Backup and Restore
        • Backup Settings
      • Benchmark Sectors
      • Whitelabeling
      • File Browser
    • Incidents
    • Support
      • Status
        • Status
        • System Monitoring
        • System Health Check
        • Notifications
      • System Tests
        • Test Email
        • Performance Test
        • Spam Test
        • Mail Spoofing Test
        • Mail and Web Filter Test
      • System Logs
      • Manual
      • Update
      • Reboot
      • Mail Manager
      • Terms & Conditions
    • Account Settings
      • Two Factor Authentication
      • License
      • Invoices
    • Notifications
  • Release Notes
    • 5.4
    • 5.3.5
    • 5.3.4
    • 5.3.3
    • 5.3.2
    • 5.3.1
    • 5.3
    • 5.2.1
    • 5.2
    • 5.1
    • 5.0
    • Version 4
      • 4.14
      • 4.13
      • 4.12.1
      • 4.11
      • 4.10.1
      • 4.9.5
      • 4.9.2
      • 4.9.1
  • Legal
    • EULA
    • Privacy Policy
    • DPA, Customer and Partner Info
    • Service Level Agreement
    • Confidentiality of Campaign Data
  • When to Contact Us
    • Contact Technical Support
Powered by GitBook
On this page
  • Introduction
  • LDAP Connection Setup in LUCY

Was this helpful?

  1. Application Screens Reference
  2. Settings
  3. Common System Settings

LDAP Servers

PreviousAPI WhitelistNextLDAP Sync Tool

Last updated 1 year ago

Was this helpful?

Introduction

LUCY's LDAP integration enables administrators to:

  1. Import Users and Recipients: Directly from the organization's directory service, simplifying user management.

  2. Authorize Access: Across the Admin Console, End-user Portal, and Awareness Website, ensuring secure and appropriate user access.

Active Directory Sync Tool for Windows

In addition to the direct LDAP integration, LUCY offers a synchronization tool for Windows. This tool enables the synchronization of your Active Directory groups with LUCY, all communication is done over API. For detailed information and setup instructions, refer to the .

LDAP Connection Setup in LUCY

To configure the LDAP connection in LUCY, follow these steps:

Navigate to Settings → Common System Settings -> LDAP Servers.

Select "Add Server"

Provide a Suitable Name for this LDAP server

For data segregation purposes, you have the flexibility to associate the configured LDAP server with a specific client. This ensures that user and group information from the LDAP server is exclusively available to the designated client. Alternatively, you can choose to make the LDAP server accessible to all clients, providing a centralized authentication and user management system across your organization. This option is particularly useful for organizations seeking to streamline operations and maintain a unified user database across multiple clients or departments.

Enter the IP address of your LDAP server.

  1. Port 389: This is the default port for LDAP (Lightweight Directory Access Protocol) connections. LDAP is an open, vendor-neutral protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Port 389 is used for LDAP connections that are not secured by default. It is suitable for scenarios where LDAP traffic is contained within a secure internal network.

  2. Port 636: This port is designated for LDAP over SSL (Secure Sockets Layer), commonly referred to as LDAPS. When connecting to an LDAP server over port 636, the communication is encrypted, providing confidentiality and protecting the information as it travels across the network. This port is recommended when LDAP queries are conducted over public networks or when enhanced security is required.

  3. Port 3268: This is the default port for LDAP connections to the Global Catalog service in Microsoft Active Directory. The Global Catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multi-domain Active Directory Domain Services (AD DS) forest. It allows users to search the directory for objects, like user accounts and groups, across all domains without needing to know the domain name.

  4. Port 3269: This port is used for LDAP over SSL connections to the Global Catalog. It is similar to port 3268 but provides the additional security benefits of SSL encryption. This is important for Global Catalog queries that need to be secure and is especially critical if the LDAP server is accessed over an insecure network or the internet.

Enter your LDAP Server Root RDN (e.g., "dc=domain,dc=com").

  1. Simple Authentication:

    • This method involves sending the user's credentials (usually a distinguished name (DN) along with a password) to the LDAP server in plain text. It's the most common authentication method used for LDAP bind operations, where "binding" refers to the process of authenticating a client to the LDAP server.

    • Simple authentication is straightforward but has security implications because credentials are not encrypted unless the connection itself is secured, for example, through SSL/TLS (LDAP over SSL or LDAPS). It's suitable for environments where security can be ensured by other means, like encrypted channels.

  2. Anonymous Authentication:

    • Anonymous authentication allows a client to bind to an LDAP server without providing any credentials. This method is used mainly for public information retrieval where individual user authentication is not required.

    • It provides limited access rights, usually only allowing the client to query or view public entries within the LDAP directory. Anonymous authentication is not recommended for environments where sensitive data access needs to be controlled or logged since it does not uniquely identify the user.

Provide the distinguished name of the user who has permission to perform LDAP queries. In this example, it's "cn=Administrator,cn=Users."

Input the password associated with the User DN for authentication.

The objectClass in LDAP is a crucial attribute that defines the kind of data an entry in the LDAP directory represents. It's like a blueprint that dictates which attributes (such as a user's name, email, or phone number) are required and which are optional for that entry.

When you bind Lucy to an LDAP server, the objectClass helps you specify and identify the types of entries you want to interact with. For example, if your application needs to authenticate users, you'll likely query entries with an objectClass of user or inetOrgPerson, as these classes are designed to represent user accounts in an LDAP directory. If you leave the objectClass attribute blank when binding Lucy to an LDAP server, the search will not be constrained by object type. This means the LDAP query could potentially return all objects within the scope of the search base, regardless of their class.

When binding Lucy to an LDAP server, the filter is used to specify which entries in the LDAP directory you want to retrieve and work with. A well-defined filter is crucial for efficient data retrieval and system performance, ensuring that Lucy interacts only with the relevant entries.

  1. Defining Scope: The filter helps to narrow down the search to specific LDAP objects that are important for Lucy's operations. For instance, if Lucy needs to sync user accounts, a filter like (objectClass=user) will target only user objects.

  2. Enhancing Performance: By using filters, Lucy queries the LDAP server for only the required data. Without a proper filter, the server might return a large amount of data, which could slow down both the LDAP server and Lucy, leading to increased load times and possible timeouts.

  3. Improving Security: Filters prevent unnecessary exposure of directory information. For example, by using a filter, Lucy would not retrieve or have access to privileged accounts if it only needs regular user accounts.

  4. Operational Specificity: Filters can also include criteria based on operational needs. For instance, if Lucy is used for a specific department, a filter like (&(objectClass=user)(department=Marketing)) could be used to fetch only users from the Marketing department.

  5. Attribute Selection: Filters can be designed to include entries with specific attributes, such as email addresses or job titles, which might be necessary for Lucy’s features like phishing simulations or training modules.

  6. Avoiding Data Overload: By excluding unnecessary object classes or attributes, filters help Lucy to avoid data overload and improve the application’s response time.

A field to limit the number of entries returned in a single search query. The amount of users fetched in each request to the LDAP server. This should be based on what is configured in the LDAP server. The default fetch amount is 1000.

LDAP Sync Tool instructions