The Active Directory authentication module allows you to link a Shinken account and an Active Directory account in order to connect to the different Web interfaces of Shinken Enterprise.
Both accounts (Shinken and Active Directory) will be linked by a common key. For example, the authentication module looks for users with a user@domain.com email address in the Shinken database and will link this account with the one in Active Directory with the same email address.
A Shinken account and an Active Directory account must have a common data in order to be linked and authorize the connection. The steps to configure the data used to link both accounts are explained below. |
To keep the Shinken and Active Directory accounts synchronized, it is far more easier to import users directly from Active Directory thanks to the Active Directory source. Please see the corresponding documentation to have more informations about this feature: Active Directory |
This module allows users to authenticate by checking the account password into an Active Directory instead of the one stored in the Shinken configuration. The setup of this authentication method is done in 3 steps:
First, the authentication module must have the connection credentials in order to connect to the Active Directory server.
This is done by modifying the /etc/shinken/modules/auth_active_directory.cfg file.
Uncomment if needed and fill the following lines:
ldap_uri ldap://myserver username myuser@mydomain.com password password basedn DC=mydomain,DC=com mapping_file /etc/shinken-user/configuration/modules/auth-active-directory/mapping.json |
The fields in the configuration example above function as following:
The Active Directory authentication module does the link between fields in the Shinken database and fields in the Active Directory base to identify the users.
By default, the module looks for contacts with the "contact_name" in Shinken base and looks for a contact in Active Directory with the same value into the "samaccountname".
It is possible to specify this behaviour by modifying the mapping file.
On a fresh installation, copy "/etc/shinken-user-example/configuration/modules/auth-active-directory/mapping.json" into "/etc/shinken-user/configuration/modules/auth-active-directory/mapping.json" (create file path if needed).
The files listed in "/etc/shinken-user-example" are in read-only mode. Add write rights after copying into "/etc/shinken-user". |
In the following example, contacts are joined by the "mail" field in Active Directory and the "email" field on Shinken.
{
"ldap_key": "mail",
"shinken_key": "email",
"login_placeholder": "Email du contact"
} |
The "login_placeholder" allows you to configure the message displayed on the Login Screen in order to give a visual hint to the user.

At last, the authentication module must be activated in the corresponding configuration files.
To enable the module on the Configuration UI, replace Cfg_password by auth-active-directory in the Synchronizer's configuration.
modules auth-active-directory |
Restart the Synchronizer to account for the latest changes.
/etc/init.d/shinken-synchronizer restart |
To enable the module on the Visualisation UI, replace Cfg_password by auth-active-directory in the Broker's configuration (WebUI module).
modules auth-active-directory, Mongodb, webui-enterprise, sla |
Restart the Broker to account for the latest changes.
/etc/init.d/shinken-broker restart |
The simultaneous activation of both Cfg_password and auth-active-directory modules can provoque non-anticipated behaviours. As the Cfg_password module checks passwords in Shinken database and the auth-active-directory module in the Active Directory, if both modules are loaded, the user will succeed to authentify with both passwords (Shinken and Active Directory).
If this behaviour is wanted, both modules can be enabled in the configuration files as following:
|
The module is at first intended for Active Directory use, but functions with OpenLDAP as well.
However, a few steps in module configuration change:
The remaining configuration doesn't change.
In the mapping file, multiple fields can be specified to join Shinken and Active Directory/LDAP accounts.
The following table lists most used fields:
| Shinken | Active Directory | OpenLDAP |
|---|---|---|
contact_name | sAMAccountName | uid |
| display_name | displayName | displayName |
| pager | telephoneNumber | telephoneNumber |