process-mining
2021.10
true
- Release notes
- Getting started
- Installation
- Configuration
- Integrations
- Authentication
- Working with Apps and Discovery Accelerators
- AppOne menus and dashboards
- AppOne setup
- TemplateOne 1.0.0 menus and dashboards
- TemplateOne 1.0.0 setup
- TemplateOne menus and fashboards
- TemplateOne 2021.4.0 setup
- Purchase to Pay Discovery Accelerator menus and dashboards
- Purchase to Pay Discovery Accelerator Setup
- Order to Cash Discovery Accelerator menus and dashboards
- Order to Cash Discovery Accelerator Setup
- Basic Connector for AppOne
- SAP Connectors
- Introduction to SAP Connector
- SAP input
- Checking the data in the SAP Connector
- Adding process specific tags to the SAP Connector for AppOne
- Adding process specific Due dates to the SAP Connector for AppOne
- Adding automation estimates to the SAP Connector for AppOne
- Adding attributes to the SAP Connector for AppOne
- Adding activities to the SAP Connector for AppOne
- Adding entities to the SAP Connector for AppOne
- SAP Order to Cash Connector for AppOne
- SAP Purchase to Pay Connector for AppOne
- SAP Connector for Purchase to Pay Discovery Accelerator
- SAP Connector for Order-to-Cash Discovery Accelerator
- Superadmin
- Dashboards and charts
- Tables and table items
- Application integrity
- How to ....
- Working with SQL connectors
- Introduction to SQL connectors
- Setting up a SQL connector
- CData Sync extractions
- Running a SQL connector
- Editing transformations
- Releasing a SQL Connector
- Scheduling data extraction
- Structure of transformations
- Using SQL connectors for released apps
- Generating a cache with scripts
- Setting up a local test environment
- Separate development and production environments
- Useful resources
Set up Secure LDAP
Process Mining
Last updated Sep 2, 2024
Set up Secure LDAP
For increased security, it is recommended to use LDAPS instead of LDAP. In case of LDAPS, the ldap setting in UiPath Process Mining must be changed:
- the
url
must be updated, - a
tlsOptions
property must be added.
The
tlsOptions
property will contain the contents of the LDAPS certificate. This certificate needs to be in the PEM file format.
If your certificate is in another format, you can use OpenSSL to convert it. The certificate needs to be added as a single
line where all line breaks are noted as
\n
. For example:
Note:
If your certificate is in another format, you can use OpenSSL to convert it. The certificate needs to be added as a single line where all line breaks are noted as \n. See below for an example.
"ExternalAuthenticationProviders": {
"ldap": {
"url": "ldaps://PROCESSGOLDTEST.pgdctest.local:636",
"base": "DC=pgdctest,DC=local",
"bindDN": "PGDCTEST\)\)\) estuser",
"bindCredentials": "Passw0rd!",
"tlsOptions": {
"ca": ["-----BEGIN CERTIFICATE----\)
KJHIBuhobUYOBuy\)
jhgbouigh\)
-----END CERTIFICATE-----"],
"rejectUnauthorized": true
}
}
}
"ExternalAuthenticationProviders": {
"ldap": {
"url": "ldaps://PROCESSGOLDTEST.pgdctest.local:636",
"base": "DC=pgdctest,DC=local",
"bindDN": "PGDCTEST\)\)\) estuser",
"bindCredentials": "Passw0rd!",
"tlsOptions": {
"ca": ["-----BEGIN CERTIFICATE----\)
KJHIBuhobUYOBuy\)
jhgbouigh\)
-----END CERTIFICATE-----"],
"rejectUnauthorized": true
}
}
}
Note: The server certificate is verified against the certificates in
“ca”
. Depending on how your LDAPS server is configured, “ca”
can contain multiple certificates, or can even be omitted.
If you experience difficulties when setting up secure LDAP, you can omit the
“ca”
property for testing purposes. In which case you also must set the “rejectUnauthorized” property to false:
"ExternalAuthenticationProviders": {
"ldap": {
"url": "ldaps://PROCESSGOLDTEST.pgdctest.local:636",
"base": "DC=pgdctest,DC=local",
"bindDN": "PGDCTEST\)\)\) estuser",
"bindCredentials": "Passw0rd!",
"tlsOptions": {
"rejectUnauthorized": false
}
}
}
"ExternalAuthenticationProviders": {
"ldap": {
"url": "ldaps://PROCESSGOLDTEST.pgdctest.local:636",
"base": "DC=pgdctest,DC=local",
"bindDN": "PGDCTEST\)\)\) estuser",
"bindCredentials": "Passw0rd!",
"tlsOptions": {
"rejectUnauthorized": false
}
}
}
This way you can check if the issue is a certificate issue or something else.
Note: Do not set
“rejectUnauthorized”
to false on production environments.