Error when successfully connecting to Pega with Active directory
I have to connect workers from my enterprise to Pega (7.3.1) with Active Directory, so I've used WebLDAP3 servlet and mapped properties, with native AuthenticationLDAPWebVerifyCredentials activity, and a ModelUser of the same unit to access the correct application.
These workers don't have operators in Pega. When they enter their AD username and password in the login screen, they connect successfully and their operators are created with correct AD properties and Pega AccessGroups.
But when the login screen opens, before they enter their username and password, this error immediatly appears on the login screen: "The information you entered was not recognized."
When they enter the information, it works very well, so I don't understand why this error appears before they enter the information. Did I forget something? Do I have to customize AuthenticationLDAPWebVerifyCredentials?
I'm french so sorry if I don't write english very well... Thanks for your answers:-), and have a nice day with Pega!
When we give AuthenticationLDAPVerifyCredentials activity directly in the authentication service, this will happen.
In step 2 of this activity, it is expecting parameters UserIdentifier and Password which needs to be passed from AuthenticationLDAP activity to AuthenticationLDAPVerifyCredentials activity.
Since you are directly calling AuthenticationLDAPVerifyCredentials activity in the authentication service, these parameters are null initially and hence you are seeing error message which will come when username/password are null or incorrect.
Use AuthenticationLDAP activity in the authentication service(WebLDAP3 in your case).
This activity is already calling AuthenticationLDAPVerifyCredentials in step 2 by passing username and pasword.
You won't see the error message when you launch the WebLDAP3 servlet url.
And thank you for your quick answer! But when I use AuthenticationLDAP activity, the login screen doesn't open, and I directly have this error in the browser: "Operator ID Unauthenticated or not available"...
Thanks again! Yes I can acess the activities from the service, here's a screenshot, and the exact error.
I've tried to use 4 activities in WebLDAP3:
- With AuthenticationLDAP or directly AuthenticationLDAPVerifyCredentials: the login screen doesn't open and an error appears in browser (shown in screenshot).
- With AuthenticationLDAPWeb: the login screen opens, no error appears, but when I enter username and password I can not connect.
- With AuthenticationLDAPWebVerifyCredentials: the login screen opens, an error appears, but when I enter username and password I can connect. Only this one seems to work although an error appears before I enter informations.
So I have a question: with AuthenticationLDAP, do I have to map the password, so that users don't have to enter it? I don't know where to find it in AD. Here's a screenshot of the properties I've mapped.
The activity is not customize, but a requestor type was in my ruleset, so I remove it from my ruleset, and now the login screen opens with AuthenticationLDAP activity, that's a first good step!
But when I enter my username and password, the error appears again and I can not connect...
I've used the remote tracer, here's a screenshot, do you see something wrong?
I have a question about requestor types: I've seen two browser requestor types in my records, the one of Pega, and another created by someone in my enterprise (with no associated ruleset), so is it correct to have two browser requestor types, and how does Pega know the one to use?
It's already 19h50 in Paris, so I have to go back to home, I'll try again to solve the problem tomorrow!
And thank you very very very much for your aswer, it helps me to resove the probleme:-).
I've added the AD directory context to the WebLdap3 search parameters (I thought it was not necessary since it is the same as the bind distinguished name), and now I can connect with AuthenticationLDAP without any error!
And I've seen the pxSystemName used in the clipborad, so now I better understand how it works...
I have another and last question to be sure I have well understood: what's the difference beetween AuthenticationLDAP and AuthenticationLDAPWeb? I think AuthenticationLDAPWeb need to receive the username from the browser url but I'm not sure.