Plexus Connect currently supports LDAP and Active Directory (AD) with Kerberos protocol.
For Plexus Connect to determine the active Windows-sso authentication server, the configuration file config.properties
there needs to be created.
This file needs to be saved on the server. We recommend to use the configuration folder.
This configuration is activating by the following startup option:
-Dcom.chemaxon.plexus.connect.configuration.propertiesFilePath=~/chemaxon/plexus-suite/config.properties"
Basic content of config.properties
is shown on following example:
authentication.type=windows-sso
security.basic.enabled=false
security.keytab.file= ~\\path_to_the_key_tab_file\\your.keytab
security.service.principal=HTTP/demo.kerberos.your_domain.com@your_domain.COM
security.adServer.url=ldap://WIN-NF3AITRLTDS.your_domain.com
#security.adServer.url=ldap://WIN-QB0M94BDT41.your_domain.com
security.ldap.searchBase=dc=your_domain,dc=com
security.ldap.searchFilter=(| (userPrincipalName={0}) (sAMAccountName={0}))
#security.ldap.searchFilter=(CN=[username])
security.ldap.connectUserGroupName=connectUsers
security.ldap.connectAdminGroupName=connectAdmins
server.port=8080
If the authentication server is properly configured and referenced keytab
file exists, Connect will authenticate User according server rules.