Navigate to Settings > User Authentication and click [Edit Mode] at the bottom of the page. Click on the small bell icon for the server for which you wish to choose attributes.
Step 1: Choose attributes to import. You will see the following screen and the import schedule will be prepopulated with several common attributes. Attributes will vary depending on the LDAP system you are using. We will focus on the most common Microsoft Active Directory attributes here.
You can add desired attributes to the list of Attributes to retrieve. Make sure each attribute is separated by a comma.
Step 2: Define Mapping between User Attributes and LDAP attributes. Here you can map the LDAP attributes that you selected for import to the User Record Fields in the K1000 appliance.
All the other attribute mappings are optional and can be set based on your needs. If you do not see an attribute you selected available for mapping then it was not present in the small amount of initial search results. There are two ways to remedy this.
You can go back to Step 1 and increase the value in the Max # Rows field or you can go add a value to the desired field in LDAP for one of the users shown in the search results on Step 2.
There are 3 attributes that are required to have a mapping. These attributes are highlighted in yellow. The LDAP Login field to be something that is static. The best choice for this would be objectguid. Having this field mapped to a static attribute will ensure that duplicate users are not created should a need to change some of the other associations for the User Record arises.
Username would be mapped to the same attribute that the user would use to login. In most cases this will be samaccoutname. Email should be mapped to the mail attribute.
Step 3: Import Data into the K1000 Review the list of users and labels to imported and/or updated on this screen.
If everything on this page looks good then go ahead and click Save.