Figure 7 above shows an LdapV3ADUserService using the Simple Authenticator.
To configure the SimpleAuthenticator component
With the station open in Workbench, expand the user service in the Nav tree and double-click on the ActiveDirectoryConfig node or LdapConfig node to access its property sheet.
If the authenticator is the “Kerberos Authenticator”, delete it (right-click it and select ).
If the authenticator is the “Simple Authenticator”, go to Step 5.
Open the ldap palette, and expand the Authenticators folder.

In the Nav tree, copy (drag and drop) the SimpleAuthenticator from the palette onto the station’s ActiveDirectoryConfig or LdapConfig component. Accept the default name in the popup Name dialog, or else enter another name, and click .
Double-click the SimpleAuthenticator to configure its properties, as follows.

Connection User
The user name for the initial connection. It may be required if the LDAP users logging in are in different sub-trees of the LDAP directory. If the LDAP server supports anonymous connections, this may not be required and can be left blank.
Connection Password
Password for the user specified as the “Connection User” (if applicable).
Authentication Mechanism
Specifies which SASL mechanism the station uses to authenticate to the server. Choices are:
simple — (default) Password is passed in clear text in authentication.
DIGEST-MD5 — Password is encrypted using Digest-MD5 mechanism.
CRAM-MD5 — Password is encrypted using CRAM-MD5 mechanism.
None — No authentication used.
It is strongly recommended to use SSL when using simple authentication. Even though credentials in clear text will be used,
at least it will be over an SSL connection.
Copyright © 2000-2016 Tridium Inc. All rights reserved.