NTLM authentication properties


The file ldapauth.properties stores several settings related to NTLM authorisation.

You should edit these settings via the user interface. Please note that some of these properties are stored encrypted.

Settings regarding NTLM authentification
 Property Default value Encrypted Explanation
ldap.search.account(empty string)yesThe LDAP account used to access the active directory in order to search for available users.
ldap.search.account.pwd(empty string)yesPassword for the LDAP account used to access the active directory in order to search for available users.
ldap.search.basedn(empty string)yesThe LDAP base DN (distinguished name) used for looking up available user accounts.
ldap.search.hop.count5noThe maximum number of referral hops that may be performed on the LDAP server. Setting this to 0 deactivates referral hops and no references will be followed.
ldap.search.port389yesThe port for the connection to the LDAP server.
ldap.search.sslfalsenoWhether SSL is used for the connection to the LDAP server.
ntlm.account(empty string)yesName of the computer account that must have been granted permission to perform user verification. It must not be a regular user account.
ntlm.account.pwd(empty string)yesPassword for the computer account.
ntlm.domain(empty string)yesThe Windows domain name. The format depends on the active directory, eg. example.de oder example0.
ntlm.domain.controller(empty string)yesThe (IP) address of the active directory controller used for authenticating users via NTLM and retrieving their data.
ntlm.domain.controller.host(empty string)yesThe host name of the active directory controller.
ntlm.fs.syncfalsenoWhen activated, all changes to the configuration will be sent to all available frontend servers. 
use.ntlmfalsenoWhether NTLM authentication is activated.