Make changes to the properties that apply to all system users, and click Save.To ease the burden of making new users, consider changing these properties: Expiration, Authentication Scheme Name and Prototype Name.
When they log in, any new LDAP users inherit these values as the default properties, including permissions. And these values
appear as the defaults when you create a new user. You can change them for a specific user at any time.
To make a custom prototype, get a list of the attrPrototype names from your LDAP administrator.The attr prototype property usually defines the group to which the user belongs.
For example, if you have user prototypes named "sysIntegrator" and "buildingManager", an LDAP user who is a member of the
buildingManager group on the LDAP server inherits permissions from the buildingManager prototype.
To make a custom prototype, right-click the Default Prototype in the Nav tree and click Duplicate.The Name window opens with the default name of defaultPrototype1.
Repeat duplicating the Default Prototype and configuring properties until you have set up a separate prototype for each user group.LDAP users may belong to multiple groups on the LDAP server, but they can only be assigned one prototype. If an LDAP user
belongs to multiple groups that match prototype names, the system defaults to the first prototype in the prototypes folder.
For example, if you have prototypes named "sysIntegrator" and "buildingManager", with “sysIntegrator” being first in the list,
and an LDAP user who is a member of both groups on the LDAP server, the user inherits permissions from the “sysIntegrator”
prototype.