{"id":960,"date":"2011-06-15T11:25:12","date_gmt":"2011-06-15T03:25:12","guid":{"rendered":"http:\/\/www.sharepointboost.com\/blog\/?p=960"},"modified":"2023-07-31T11:40:59","modified_gmt":"2023-07-31T03:40:59","slug":"how-to-configure-claims-based-authentication-for-use-with-an-ldap-provider-in-sharepoint-2010","status":"publish","type":"post","link":"https:\/\/www.boostsolutions.com\/blog\/how-to-configure-claims-based-authentication-for-use-with-an-ldap-provider-in-sharepoint-2010\/","title":{"rendered":"How to Configure Claims Based Authentication for Use with an LDAP Provider in SharePoint 2010"},"content":{"rendered":"<p>Using an LDAP provider with form authentication means that users will user their Windows or AD account to login. However, because form based authentication will be used they don&#8217;t get the usual popup, but they will use a sign-in page to login in.<\/p>\n<p>The following steps will help you set it up:<\/p>\n<p><strong>First, create users in AD LDS instance<\/strong><\/p>\n<p>Create a new AD LDS instance by AD LDS Setup Wizard.<\/p>\n<p><a href=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky1.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-970\" src=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky1.jpg\" alt=\"\" width=\"818\" height=\"568\" srcset=\"https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky1.jpg 909w, https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky1-300x208.jpg 300w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><\/a><\/p>\n<p>Connect to the new instance by ADSI Edit tool,then create account in the instance as shown in the following screenshot.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky2.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-971\" src=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky2.jpg\" alt=\"\" width=\"784\" height=\"511\" srcset=\"https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky2.jpg 871w, https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky2-300x195.jpg 300w\" sizes=\"(max-width: 784px) 100vw, 784px\" \/><\/a><\/p>\n<p><strong>Create a web application<\/strong><\/p>\n<p>Go to Central Administration&gt;Application Management<\/p>\n<p>Click on Manage Web Applications<\/p>\n<p>Click New<\/p>\n<p>Slect Claims Based Authentication<\/p>\n<p>Identity providers<\/p>\n<p>Check the Enable Windows Authentication box or you won&#8217;t be able to crawl site<\/p>\n<p>Check the Enable ASP.NET Membership and Role Provider check-box<\/p>\n<p>In the Membership provider name edit box,type LdapMembership1<\/p>\n<p>In the Role provider name edit box,type LdapRole1.<\/p>\n<p><a href=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky3.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-972\" src=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky3.jpg\" alt=\"\" width=\"607\" height=\"540\" srcset=\"https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky3.jpg 607w, https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky3-300x266.jpg 300w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/a><\/p>\n<p><strong>Create a new site collection<\/strong><\/p>\n<p>Go to Central Administration&gt;Application Management<\/p>\n<p>Click Create site collections<\/p>\n<p>Select the newly created web application<\/p>\n<p>Fill in a name and select a template<\/p>\n<p><strong>Adjust the web.config of the Central Administration site<\/strong><\/p>\n<p>Open the Central Administration site&#8217;s web.config file<\/p>\n<p>Find the &lt;system.web&gt;entry<\/p>\n<p>Past the following XML directly below it<\/p>\n<p>&lt;membership defaultProvider=&#8221;LdapMembership1&#8243;&gt;<\/p>\n<p>&lt;providers&gt;<\/p>\n<p>&lt;add name=&#8221; LdapMembership1&#8243; type=&#8221;Microsoft.Office.Server.Security.LdapMembershipProvider,<\/p>\n<p>Microsoft.Office.Server.UserProfiles, Version=14.0.0.0, Culture=neutral,<\/p>\n<p>PublicKeyToken=71e9bce111e9429c&#8221;<\/p>\n<p>server=&#8221;dc.BoostSolutions.com&#8221;<\/p>\n<p>port=&#8221;389&#8243;<\/p>\n<p>useSSL=&#8221;false&#8221;<\/p>\n<p>userDNAttribute=&#8221;distinguishedName&#8221;<\/p>\n<p>userNameAttribute=&#8221;cn&#8221;<\/p>\n<p>userContainer=&#8221;CN=Users,CN=sharepoint,DC=boost,DC=COM&#8221;<\/p>\n<p>userObjectClass=&#8221;user&#8221;<\/p>\n<p>userFilter=&#8221;(ObjectClass=user)&#8221;<\/p>\n<p>scope=&#8221;Subtree&#8221;<\/p>\n<p>otherRequiredUserAttributes=&#8221;sn,givenname,cn&#8221; \/&gt;<\/p>\n<p>&lt;\/providers&gt;<\/p>\n<p>&lt;\/membership&gt;<\/p>\n<p>&lt;roleManager enabled=&#8221;true&#8221; defaultProvider=&#8221;AspNetWindowsTokenRoleProvider&#8221;&gt;<\/p>\n<p>&lt;providers&gt;<\/p>\n<p>&lt;add name=&#8221;LdapRole1&#8243; type=&#8221;Microsoft.Office.Server.Security.LdapRoleProvider,<\/p>\n<p>Microsoft.Office.Server, Version=14.0.0.0, Culture=neutral,<\/p>\n<p>PublicKeyToken=71e9bce111e9429c&#8221;<\/p>\n<p>server=&#8221;dc.BoostSolutions.com&#8221;<\/p>\n<p>port=&#8221;389&#8243;<\/p>\n<p>useSSL=&#8221;false&#8221;<\/p>\n<p>groupContainer=&#8221;CN=Users,CN=sharepoint,DC=boost,DC=COM&#8221;<\/p>\n<p>groupNameAttribute=&#8221;cn&#8221;<\/p>\n<p>groupNameAlternateSearchAttribute=&#8221;samAccountName&#8221;<\/p>\n<p>groupMemberAttribute=&#8221;member&#8221;<\/p>\n<p>userNameAttribute=&#8221;cn&#8221;<\/p>\n<p>dnAttribute=&#8221;distinguishedName&#8221;<\/p>\n<p>groupFilter=&#8221;(ObjectClass=group)&#8221;<\/p>\n<p>userFilter=&#8221;(ObjectClass=person)&#8221;<\/p>\n<p>scope=&#8221;Subtree&#8221; \/&gt;<\/p>\n<p>&lt;\/providers&gt;<\/p>\n<p>&lt;\/roleManager&gt;<\/p>\n<p>Double check whether the &lt;membership&gt;and&lt;rolemanager&gt;entries only exist ones.Delete any double entries.<\/p>\n<p>Paste the following XML below the &lt;PeoplePickerWildcards&gt;entry.<\/p>\n<p>&lt;clear \/&gt;<\/p>\n<p>&lt;add key=&#8221;AspNetSqlMembershipProvider&#8221; value=&#8221;%&#8221; \/&gt;<\/p>\n<p>&lt;add key=&#8221;LdapMemberShip1&#8243; value=&#8221;*&#8221;\/&gt;<\/p>\n<p>&lt;add key=&#8221;LdapRole1&#8243; value=&#8221;*&#8221;\/&gt;<\/p>\n<p><strong>Adjust the web.config of the claims based web application<\/strong><\/p>\n<p>Open the claims based web application&#8217;s web.config file<\/p>\n<p>Locate the &lt;membership&gt;entry<\/p>\n<p>Past the following XML directly below the &lt;providers&gt;entry.<\/p>\n<p>&lt;add name=&#8221; LdapMembership1&#8243; type=&#8221;Microsoft.Office.Server.Security.LdapMembershipProvider,<\/p>\n<p>Microsoft.Office.Server.UserProfiles, Version=14.0.0.0, Culture=neutral,<\/p>\n<p>PublicKeyToken=71e9bce111e9429c&#8221;<\/p>\n<p>server=&#8221;dc.BoostSolutions.com&#8221;<\/p>\n<p>port=&#8221;389&#8243;<\/p>\n<p>useSSL=&#8221;false&#8221;<\/p>\n<p>userDNAttribute=&#8221;distinguishedName&#8221;<\/p>\n<p>userNameAttribute=&#8221;cn&#8221;<\/p>\n<p>userContainer=&#8221;CN=Users,CN=sharepoint,DC=boost,DC=COM&#8221;<\/p>\n<p>userObjectClass=&#8221;user&#8221;<\/p>\n<p>userFilter=&#8221;(ObjectClass=user)&#8221;<\/p>\n<p>scope=&#8221;Subtree&#8221;<\/p>\n<p>otherRequiredUserAttributes=&#8221;sn,givenname,cn&#8221; \/&gt;<\/p>\n<p>Locate the &lt;roleManager&gt;entry<\/p>\n<p>Past the following XML directly below the &lt;providers&gt;entry.<\/p>\n<p>&lt;add name=&#8221;LdapRole1&#8243; type=&#8221;Microsoft.Office.Server.Security.LdapRoleProvider,<\/p>\n<p>Microsoft.Office.Server, Version=14.0.0.0, Culture=neutral,<\/p>\n<p>PublicKeyToken=71e9bce111e9429c&#8221;<\/p>\n<p>server=&#8221;dc.BoostSolutions.com&#8221;<\/p>\n<p>port=&#8221;389&#8243;<\/p>\n<p>useSSL=&#8221;false&#8221;<\/p>\n<p>groupContainer=&#8221;CN=Users,CN=sharepoint,DC=boost,DC=COM&#8221;<\/p>\n<p>groupNameAttribute=&#8221;cn&#8221;<\/p>\n<p>groupNameAlternateSearchAttribute=&#8221;samAccountName&#8221;<\/p>\n<p>groupMemberAttribute=&#8221;member&#8221;<\/p>\n<p>userNameAttribute=&#8221;cn&#8221;<\/p>\n<p>dnAttribute=&#8221;distinguishedName&#8221;<\/p>\n<p>groupFilter=&#8221;(ObjectClass=group)&#8221;<\/p>\n<p>userFilter=&#8221;(ObjectClass=person)&#8221;<\/p>\n<p>scope=&#8221;Subtree&#8221; \/&gt;<\/p>\n<p>Past the following XML below the PeoplePickerWildcards entry<\/p>\n<p>&lt;clear \/&gt;<\/p>\n<p>&lt;add key=&#8221;AspNetSqlMembershipProvider&#8221; value=&#8221;%&#8221; \/&gt;<\/p>\n<p>&lt;add key=&#8221;LdapMemberShip1&#8243; value=&#8221;*&#8221;\/&gt;<\/p>\n<p>&lt;add key=&#8221;LdapRole1&#8243; value=&#8221;*&#8221;\/&gt;<\/p>\n<p><strong>Adjust the web.config of the Security Token Service(STS)virtual directory<\/strong><\/p>\n<p><strong>NB:If your environment is multiple servers,you will need to change the Security Token Service virtual directory on each server hosting either Central Administration or the claims based web application<\/strong><\/p>\n<p>Open the Security Token Service (STS)virtual directory web.config file<\/p>\n<p>Find the &lt;system.web&gt;entry<\/p>\n<p>Add a &lt;system.web&gt; entry directory below it<\/p>\n<p>Past the following XML directly below the &lt;system.web&gt; entry<strong> <\/strong><\/p>\n<p>&lt;membership defaultProvider=&#8221;LdapMembership1&#8243;&gt;<\/p>\n<p>&lt;providers&gt;<\/p>\n<p>&lt;add name=&#8221; LdapMembership1&#8243; type=&#8221;Microsoft.Office.Server.Security.LdapMembershipProvider,<\/p>\n<p>Microsoft.Office.Server.UserProfiles, Version=14.0.0.0, Culture=neutral,<\/p>\n<p>PublicKeyToken=71e9bce111e9429c&#8221;<\/p>\n<p>server=&#8221;dc.BoostSolutions.com&#8221;<\/p>\n<p>port=&#8221;389&#8243;<\/p>\n<p>useSSL=&#8221;false&#8221;<\/p>\n<p>userDNAttribute=&#8221;distinguishedName&#8221;<\/p>\n<p>userNameAttribute=&#8221;cn&#8221;<\/p>\n<p>userContainer=&#8221;CN=Users,CN=sharepoint,DC=boost,DC=COM&#8221;<\/p>\n<p>userObjectClass=&#8221;user&#8221;<\/p>\n<p>userFilter=&#8221;(ObjectClass=user)&#8221;<\/p>\n<p>scope=&#8221;Subtree&#8221;<\/p>\n<p>otherRequiredUserAttributes=&#8221;sn,givenname,cn&#8221; \/&gt;<\/p>\n<p>&lt;\/providers&gt;<\/p>\n<p>&lt;\/membership&gt;<\/p>\n<p>&lt;roleManager enabled=&#8221;true&#8221; defaultProvider=&#8221;AspNetWindowsTokenRoleProvider&#8221;&gt;<\/p>\n<p>&lt;providers&gt;<\/p>\n<p>&lt;add name=&#8221;LdapRole1&#8243; type=&#8221;Microsoft.Office.Server.Security.LdapRoleProvider,<\/p>\n<p>Microsoft.Office.Server, Version=14.0.0.0, Culture=neutral,<\/p>\n<p>PublicKeyToken=71e9bce111e9429c&#8221;<\/p>\n<p>server=&#8221;dc.BoostSolutions.com&#8221;<\/p>\n<p>port=&#8221;389&#8243;<\/p>\n<p>useSSL=&#8221;false&#8221;<\/p>\n<p>groupContainer=&#8221;CN=Users,CN=sharepoint,DC=boost,DC=COM&#8221;<\/p>\n<p>groupNameAttribute=&#8221;cn&#8221;<\/p>\n<p>groupNameAlternateSearchAttribute=&#8221;samAccountName&#8221;<\/p>\n<p>groupMemberAttribute=&#8221;member&#8221;<\/p>\n<p>userNameAttribute=&#8221;cn&#8221;<\/p>\n<p>dnAttribute=&#8221;distinguishedName&#8221;<\/p>\n<p>groupFilter=&#8221;(ObjectClass=group)&#8221;<\/p>\n<p>userFilter=&#8221;(ObjectClass=person)&#8221;<\/p>\n<p>scope=&#8221;Subtree&#8221; \/&gt;<\/p>\n<p>&lt;\/providers&gt;<\/p>\n<p>&lt;\/roleManager&gt;<\/p>\n<p>Add a &lt;\/system.web&gt;entry directly below it<\/p>\n<p><strong>Add a user policy to the web application<\/strong><\/p>\n<p>Go to Central administration&gt;Application Management<\/p>\n<p>Click on Management Web Applications<\/p>\n<p>Select the claims based web application<\/p>\n<p>Click on User Policy<\/p>\n<p>Click on the Add Users link<\/p>\n<p>Click Next button<\/p>\n<p>Click the Address Book icon.<\/p>\n<p>Type in the NT login or account name and click the search button.if it&#8217;s working correctly you should see at least two entries for the Account-one is for the user&#8217;s Active Directory account,and one is for that same account but which was found using LDAP provider.<\/p>\n<p>Select the account in the User section and click the Add button<\/p>\n<p>Click the OK button<\/p>\n<p>Check the Full Control checkbox,then click the Finish button.<\/p>\n<p><a href=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky4.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-973\" src=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky4.jpg\" alt=\"\" width=\"591\" height=\"538\" srcset=\"https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky4.jpg 591w, https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky4-300x273.jpg 300w\" sizes=\"(max-width: 591px) 100vw, 591px\" \/><\/a><\/p>\n<p>You can browser to the web application and log in using forms based authentication.<\/p>\n<p><a href=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky5.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-974\" src=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky5.jpg\" alt=\"\" width=\"578\" height=\"210\" srcset=\"https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky5.jpg 578w, https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky5-300x108.jpg 300w\" sizes=\"(max-width: 578px) 100vw, 578px\" \/><\/a><\/p>\n<p><strong>?<\/strong><strong>?<\/strong><\/p>\n<p>Select Forms Authentication in the dropdown<\/p>\n<p><a href=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky6.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-975\" src=\"http:\/\/www.BoostSolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky6.jpg\" alt=\"\" width=\"579\" height=\"234\" srcset=\"https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky6.jpg 579w, https:\/\/www.boostsolutions.com\/blog\/wp-content\/uploads\/2011\/06\/rocky6-300x121.jpg 300w\" sizes=\"(max-width: 579px) 100vw, 579px\" \/><\/a><\/p>\n<p>And fill in the appropriate user name and password.<\/p>\n<p>Any questions, comments or suggestions? Please just comment on my post! \ud83d\ude42 Cheers!<\/p>\n<p><strong> <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using an LDAP provider with form authentication means that users will user their Windows or AD account to login. However, because form based authentication will be used they don&#8217;t get the usual popup, but they will use a sign-in page to login in. The following steps will help you set it up: First, create users [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[461,125,480],"tags":[103,102,26,486,12],"_links":{"self":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/960"}],"collection":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=960"}],"version-history":[{"count":25,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/960\/revisions"}],"predecessor-version":[{"id":1010,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/960\/revisions\/1010"}],"wp:attachment":[{"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.boostsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}