Skip to main content

Active Directory Self Service

Active Directory Self Service allows users to manage certain AD account-related tasks without administrator intervention. Some common self service functionalities include:

  • Unlocking a locked account
  • Resetting password

This reduces the IT support dependency and improve productivity.

Why is LDAPS Required for Self Service?

For self service password resets and account unlocks, the self service tool must communicate with Active Directory to modify user account details. This communication occurs over LDAPS (Lightweight Directory Access Protocol Secure), which ensures that directory information is accessed and updated securely.

LDAPS (LDAP over SSL/TLS) is essential for,

  • Encrypting communication between the AD server and LDAP clients
  • Preventing eavesdropping and man-in-the-middle attacks
  • Ensuring secure authentication and data transfer when modifying AD accounts

How Does LDAPS Secure Communication?

LDAPS secures data transmission by leveraging SSL/TLS encryption with a certificate installed on the Active Directory server. The process works as follows:

  1. The LDAPS client sends a request to secure connection over port 636.
  2. The ServiceOps server verifies the certificate to ensure it is from a trusted source.
  3. Once validated, an encrypted session is established for secure data exchange.
  4. The user sends the authentication details.
  5. The AD server validates the credentials and process the requests like password reset and unlock account.

Thus using LDAPS, all sensitive information — such as passwords and account modifications — remains fully protected from security threats.

note
  • Install SSL/TLS certificates on the AD server.
  • LDAPS must be configured on both primary and backup servers in high-availability setups.

Configuring LDAPS Certificate

To configure LDAPS, follow the below procedure:

  1. Login to the terminal server and create a folder named "Backup" using the below command.

    mkdir backup

  2. Move to the Backup folder using the below command:

    cd backup

  1. Copy the "cacerts" folder from the path "/usr/local/java/jdk-17.0.12/lib/security" to the "backup" folder using the below command:

    cp -r /usr/local/java/jdk-17.0.12/lib/security/cacerts

  1. Once copied run the below command:

    Syntax: /usr/local/java/jdk-17.0.12/bin/keytool -import -alias {alias_example} -keystore cacerts -file /{filepath}"

    Example: /usr/local/java/jdk-17.0.12/bin/keytool -import -alias motadata -keystore cacerts -file /home/flotomate/ldaps-for-itsm.cer

note

Save the alias name for future use.

  1. Press enter and provide the keystore certificate password. For example, here "changeit" is used.

  1. A confirmation message "Trust this certificate?" will appear. Type Yes.

  1. Restart the main-server and analytics-server services using the below commands:

    sudo systemctl restart ft-main-server.service
    sudo systemctl restart ft-analytics-server.service
  2. Now, change the LDAP configuration to LDAPS and port 636.

  1. Test the connection. Once successful, try to reset the password and it will work.

Active Directory Self Service Option

Active Directory Self Service

Enter the Email ID or Logon Name and click on Reset Password or Unlock Account whichever is feasible.

On clicking, answer and verify the security questions asked as shown below. The Security Questions configured in the Edit User Profile will be used here for Reset Password and Unlock Account.

Verify Security Questions

Once all the questions are verified, Reset the Password by entering the new Password and Confirm Password as shown below.

Reset Password

Once done, click Submit, and the password will get changed. Also, it will get updated in the LDAP server. You can now login to the Support Portal using the new password.

Similarly, following the same process you can unlock your account if it gets locked somehow.