Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

width75%

...


Section


Column
width75%

Connecting your frevvo Cloud tenant to your on-premise LDAP server requires some extra steps in addition to setting up the LDAP Security Manager tenant screen. Secure LDAP provides encrypted communication between frevvo and LDAP. Refer to the Secure LDAP Configuration topic below and our blog article, LDAP in the cloud which discusses the topic in more detail.

Info

Safari browsers later than v5.1.7 running on Windows is no longer supported. Issues were found when using Safari with LDAP - SSO.


Column
width25%

On This Page:

Table of Contents
maxLevel2


Secure LDAP Configuration

will frevvo will be connecting to your LDAP server over the network. Here are two methods to secure the LDAP connection:

...

Note

Self signed certificates are not supported for Live Forms frevvo Online. Although they are supported for in frevvo in-house, use of self-signed certificates is not recommended.

Finally you need to install your signed or self-signed certificate. You can import the certificate into a keystore that  can that frevvo can access and trust. Follow the instructions for your keystore. If  is If frevvo is installed in a tomcat server, the tomcat keystore can be used. Refer to this Apache Tomcat website for instructions .

...

Configuring LDAPs for your Cloud tenant

Once your  Online frevvo Online cloud hosted tenant has been provisioned for production use, follow the steps below to configure your tenant to use the frevvo LDAP/Active Directory Security Manager to integrate with your company's AD server:

  1. Confirm that your LDAP/AD server is running LDAPs with a third-party certification authority.
    1. It is likely your LDAP/AD server already has a CA certificate installed. But if not, this Microsoft KB article tells you how to do this: It is important that the hostname in the certificate matches the hostname in your ldaps url.
    2. Your LDAP/AD server must be running LDAPs with a third-party certification authority BEFORE performing Step 4.
      Warning

      Self signed certificates are not supported for Live Forms frevvo Online tenants


  2. Customers that use firewall white-listing must add the frevvo cloud outgoing server IP 54.86.85.105 (host outgoing.frevvo.com) to the list.
  3. Email your frevvo Security Manager resource. The frevvo infrastructure team will white label your server and port using the information provided.

    1. Provide frevvo with the following:

      1. the DNS Name(s) of the machine(s) hosting your AD server AND the IP Address or range of IP Addresses (in the case where your LDAP config is fault tolerant) of the machine(s) hosting your AD server.

  4. STOP:
    1. Wait for a reply email from your frevvo Security Manager resource letting you know that the frevvo infrastructure team has completed the white listing of your IP(s) on port 636 (ssl) or port 389 (TLS) in our firewall and verified connectivity.
  5. Once you receive this white listing confirmation email verify that you have completed:
    1. the Prerequisite Tasks listed below
    2. collected the information in the Key Information to Collect topic below
  6. Go to https://app.frevvo.com
    1. Login as your tenant admin
    2. Click on the Edit tenant link
    3. Change the security manager to the LDAP Security Manager.

      Warning

      If you have developed projects/forms/workflows in your starter/trial cloud tenant that you want to preserve, download them to your desktop as a backup BEFORE changing the existing Security Manager to the LDAP Security Manager. 


    4. Change the LDAP properties to your company's AD server following the instructions listed below
    5. Save your tenant AD configuration settings
    6. Verify that your tenant is now connected to your company AD server

...

Active Directory Customers using LDAP must ensure frevvo.TenantAdmin and frevvo.Designer groups are specified on your LDAP/AD server. The group names must be spelled as shown. Upper/lower case may be a factor for Open LDAP systems.

...

  • Tenant admin users must be assigned to the frevvo.TenantAdmin group.
  • Designer users must be assigned to the frevvo.Designer group.

...

  •  Note that, unlike the default security manager, users in the frevvo.TenantAdmin group must also be in the frevvo.Designer group

...

  • to design forms/workflows.
Warning
  • Contact the frevvo Customer Success team to schedule your Security Manager configuration.
  • frevvo Best Practice recommends that you create a user account in your Active Directory that will house all of your deployed Production forms/workflows. This user can be named anything i.e.frevvoProduction but it must be a member of the frevvo.Designer group
  • Review the documentation on Preserving Projects/Forms/Workflows developed in your trial/starter tenant BEFORE changing security managers.
  • There are two additional roles in in frevvo frevvo.Publisher and frevvo.ReadOnly.  These roles are optional.
    • In order to give a user the frevvo.publishers role, create
    • the  
    • the frevvo.Publisher  group in your AD and assign users to it. Refer to the 
    • Administrator Best Practices
    • Publisher Role Documentation for an explanation of this role.
    • In order to give a user the frevvo.ReadOnly role, create the frevvo.ReadOnly group in your AD and assign users to it. Following frevvo Best Practice eliminates the need for this role.

Configuring

...

frevvo and LDAP/Active Directory 

users frevvo users and groups can be maintained externally in systems such as Active Directory or Open LDAP.  Follow these steps to integrate  and integrate frevvo and your LDAP server:

  1. Collect the key information listed below and verify the Prerequisite Tasks have been performed.
  2. Create a tenant with the LDAP Security Manager class.

...

  • LDAP server name or ip
  • LDAP server port
  • User name and password with proper permissions to access and browse LDAP.
  • LDAP groups and/or users that will be considered frevvo designers. These users will be able to create forms and workflows in frevvo.
  • LDAP groups and users that will be considered  administratorsfrevvo administrators.
  • LDAP groups and users that will be considered  publishersfrevvo publishers. This role gives a user the permission to go to the home page of every other tenant user. 
  • LDAP groups and users that will be considered ReadOnly.
  • LDAP user and groups base filters
  • LDAP all users and all groups filters
  • LDAP the attribute names in your Active Directory for UserId Display, GroupId Display, User Member Of, Group Member, First Name, Last Name, Email and Manager (optional)

...

The connection to your LDAP server is configured at the tenant level.

    1. Login to your as frevvo as the tenant admin
    2. Click on Manage Tenants
    3. You will see a page where the current tenants are listed. If this is a new installation you will only see the default tenant d
    4. Click on the plus icon to add a new tenant or click the Edit Tenant link to edit an existing one.Configure the tenant for the LDAP Security Manager:
    5. Choose LDAP Security Manager

      .

      from the Security Manager Class 

      drop down

      dropdown.

Section Column
width40%
    1. Panel
      titleAdd New Tenant Screen
Image Removed
    1. Image Added

      add LDAP Tenant 2.PNGImage Added

column

    1. Expand
width40%
    1. title Click here to view example Edit Tenant screen...


      Panel
      titleEdit Existing Tenant Screen


      Image Modified



    2. Enter your LDAP Configuration Properties. Alternatively, you can start off from one of the sample configurations and provide only the key information listed above. See above for information on the TLS checkbox.

      Note

      The Name/value table highlighted in the image allows you to configure up to 10 additional LDAP properties. See this Oracle website for a complete list of all available LDAP properties. For example, you can configure

    3. to
    4. frevvo to ignore or follow referrals.

      Setting the java.naming.referral property to a value of "ignore" in the Name/Value table configures

    5. to
    6. frevvo to ignore referrals. Consult your LDAP Administrator for the details.


      If you are creating a new tenant:
      1. Enter a tenant id, a tenant name and description.
      2. The Max Concurrent Users is the maximum allowed by your license or less.
      3. Specify the LDAP User ID that will have the tenant admin permission. If editing an existing tenant, verify that the tenant admin user id is the LDAP user id for the tenant admin.
      1. Click Submit. You will see your new tenant in the tenant list if the connection to your LDAP server is successful.


Warning

The Ignore Case and Notify checkboxes are checked by default. It is recommended that you leave them checked. Refer to Mixed or Upper case User Names topic for an explanation of the Ignore Case option.

The Notify checkbox determines whether the task notification emails (including new task, rejection, escalation and reminders) setup in workflows frevvo workflows are sent or not.


Clicking the submit button tests the connection. Any errors are displayed at the top of the form. Here is an example of an error when there is a typo in the LDAP server name:
Here is another example if the connection password is not correct

Refer to FAQ - Live Forms frevvo and LDAP for more troubleshooting information.

...

A Tenant admin can login directly to Live Forms frevvo or login with a user id who has been given tenant admin permissions in your Active Directory.

When you create a new tenant you are prompted to set up a tenant admin user id, password and email address. This tenant admin does not authenticate via your LDAP IDP. It only exists in Live Formsfrevvo. If you experience an issue with your LDAP configuration such that you can't login as an Active Directory authenticated user, use th built-in admin to login to your tenant as a tenant admin in order to fix your configuration issue. The built-in is able to access the tenant frevvo tenant admin functions if your LDAP Server should become inaccessible. Only one built-in tenant admin account is supported.

...

Browse this URL to login as the built-in: <base_URL>/frevvo/web/admin/login. When specified, will frevvo will prepend the base URL to the URLs in your Form/Document Actions. The <base_URL> is typically http(s)://<your servername>:<port>. For cloud customers the <base> is always https://app.frevvo.com.

  • You must use the admin specific URL - <base-url>/frevvo/web/admin/login - to login as the built-in.

  • Non admin users can also login using the admin specific URL.

...

Here are some quick tests to check if the LDAP configuration is correct:

  1. Login as the  tenant frevvo tenant admin for the LDAP tenant.
  2. Click on the Manage Users link.
  3. Click All. You should see a list of LDAP users which were assigned one of these roles frevvo roles on the LDAP server: frevvo.TenantAdmin, frevvo.Designer, frevvo.Publisher, frevvo.ReadOnly
  4. Now, click Back To Manage Tenant.
  5. Click Manage Roles. You should see a list of groups from your LDAP server.
  6. Log out from  from frevvo (you should be currently logged in as the tenantadmin)
  7. Try to login with the user name and password of a designer user in LDAP. You need to specify the proper tenant when logging in. For instance, if john is a valid LDAP user and the name of the LDAP tenant is MYLDAP, you should log in as john@MYLDAP. The password would be john's password in LDAP. Verify that the Project Home Page displays.

  8. Log out from frevvo
  9. Try to login with the user name and password of a non-designer user in LDAP. Verify that the user's Task List displays.

Since you are using LDAP to define users frevvo users and roles (i.e., groups), you do not see an Add User icon or Add Role icon on the Manage Users or Manage Roles pages.

...

These are the properties used to configure the LDAP/Active Directory security manager. The properties in bold are required.

Property DescriptionActive Directory Sample ConfigurationOpenLDAP Sample Configuration
Connection URLldap server url

In-house

ldap://[your server]:[port, typically the default is 389 ]

Cloud - SSL installed on your LDAP server

ldaps://[your server]:[port, typically the default is 636]

In-house

ldap://[your server]:[port, typically the default is 389]

Cloud -SSL installed on your LDAP server

ldaps://[your server]:[port, typically the default is 636]

Connection User

User to connect to LDAP.

This user must have the proper permissions to read and run queries in the ldap server.

If using Active Directory, it is common to specify the domain.

Ex: an entry of TEST\Administrator refers to the user Administrator in the TEST domain.

[user name]
cn=admin,dc=test,dc=frevvo,dc=com
Connection PasswordPassword for the Connection user.[user password][user password]
Users Base

Searches for users will start from the ldap node specified by this property.I

If the value is empty the searches will start from the root domain.

CN=Users,DC=test,DC=windows,DC=frevvo,DC=comDC=test,DC=frevvo,DC=com
Groups Base

Searches for the groups will start from the ldap node specified by this property.

If the value is empty, searches will start from the root domain

CN=Users,DC=test,DC=windows,DC=frevvo,DC=comDC=test,DC=frevvo,DC=com
UserId Display

User attribute that will be visible in frevvo.

This is what will be displayed in the list of users a tenant admin sees and has to be unique in the server.

Another restriction is that the values for the attribute configured here cannot have spaces.

For instance, don't configure CN as the value since it can contain spaces in most systems.

sAMAccountNameuid
GroupId Display

Group attribute that will be visible in frevvo.

This is, for instance, what will be displayed in the list of groups a tenant admin sees or the groups used in workflows.

This attribute has to be unique in the server.

sAMAccountNameentryDN
Notify checkboxNotifications are emails sent by frevvo to workflows participants. If checked, notifications will be sent.Check the Notifications checkboxCheck the Notifications checkbox
All Groups Filter

The expected value is an LDAP filter expression.

The expression should return the groups that will have access to frevvo forms and workflows.

(objectClass=group)( | (objectClass=groupOfUniqueNames)(objectClass=organizationalRole))
All Users Filter

The expected value is an LDAP filter expression.

The expression should return the users that will have access to frevvo forms and workflows.

(objectClass=user)(objectClass=person)
User Member Of1Attribute on a user object storing the groups the user is a member of. memberOf" "
Group Member1Attribute on a group object storing the users that are a member of this group.memberuniqueMember
First Name

Name of the user ''first name'' attribute

givenNamecn
Last NameName of the user ''last name'' attribute.snsn
Email

Name of the user ''email'' attribute in the LDAP server.

This value can be used in a rule is used in email notifications

mailmail
Manager

Attribute on a user object storing the DN of the user’s manager. This value can be retrieved in a rule.

It can also be used in workflow navigation using the subject.reports.to data available in frevvo.

managermanager
Ignore Case checkbox

If checked, 

ignores

frevvo ignores the case stored in LDAP systems.

This is primarily for the purpose of determining roles.

Check the Ignore Case checkboxCheck the Ignore Case checkbox
CustomThis is a a comma separated list of attribute names to be retrieved from the LDAP Server.Ex: carLicense,employeeNumberEx: carLicense,employeeNumber
TLS

This enables simple authentication over TLS. If checked, a trusted certificate for the LDAP server is required.

Refer to the secure the connection topic for details.

Check if you are using TLS to secure the connection.  Check if you are using TLS to secure the connection
  1. If your AD has nested groups, please see this FAQ: How do I enable frevvo to retrieve users from nested groups?

Mixed or Uppercase User Names

Info

frevvo user names are case sensitive; the user name johndoe'' is not the same as JohnDoe. Several LDAP systems are case insensitive. Thus the two user names would resolve to the same LDAP account but to different frevvo user accounts.

To avoid case issues follow these steps described in more detail below:

The first issue occurs when the user logs in. For instance, John Stevens LDAP account is JStevens but he logs in as jstevens, he will be recognized by case insensitive LDAP and thus granted access but will not be recognized as a designer or as a tenant admin by frevvo. To solve this, check the Ignore Case checkbox on the LDAP Configuration screen. To prevent issues you could always login to frevvo using lower case jstevens. LDAP will grant access as it is case insensitive and frevvo will know that you may have the designer or admin special permission. However users can forget to do this. Setting Ignore Case in your LDAP security configuration will solve this. 

The second problem is in directing tasks to  users frevvo users if your LDAP user names are mixed case. One solution is to use hidden controls on your forms with rules to convert the case of user names to lower case. The example below shows two text controls on a form, one visible, EmployeeMixedCase, and the other hidden, Employee.

...

...