Configure Active Directory Authentication

You can configure Active Directory Authentication to allow MiCollab -IDS users to use their directory server credentials (domain name and password) to log into the following MiCollab end-user interfaces:

The following conditions apply:

Configuring Active Directory Authentication

  1. If you are configuring authentication for a MiVoice 5000 integration:

    • Log into the MiVoice 5000 Management Portal (MMP) or the MiVoice 5000 Manager.

    • Access the Telephony Service > Subscribers > Terminals and Applications > MiCollab > Connections menu.

    • Check the Windows Login for Authentication box.

  2. Log into the MiCollab server manager.

  3. Under Configuration, under Integrated Directory Service, click Edit next to the domain. The IDS Connection page opens for the directory server.

    • If a secondary directory server is configured for the domain, authentication requests are automatically directed to the secondary server if the primary is unavailable.

    • Secure authentication requests are required as part of the IDS connection. Set the Connection Method to either TLS or SSL. The Connection Method cannot be Unsecured.

    • You can only enable Active Directory Authentication on a single domain. Before you can select a different domain, you must first disable the currently selected domain.

  4. Check the Enable authentication box. Do not check the Enable authentication box for MiVoice 5000 and Generic LDAP integrations.

  5. Click Save. Active Directory authentication does not take effect until after the next periodic synchronization occurs.

  6. Click Sync.

  7. After the synchronization is complete, verify that you can log into a user's End User portal using the user's directory service credentials.

  8. The system sends a Welcome Email to all users that you have configured for Active Directory Authentication. The Welcome Email informs the users that they must use their directory server credentials to log into their application interfaces.

Disabling Active Directory Authentication

If you disable Active Directory authentication, users will no longer be able to log into their MiCollab user interfaces using their directory server credentials (domain name and password). You must set a MiCollab temporary replacement password to allow them to log into the MiCollab user interfaces. A user's directory service domain password is not affected by this replacement password.

  1. Log into the MiCollab server manager.

  2. Under Configuration, under Integrated Directory Service.

  3. Click Edit for the desired domain.

  4. Clear the Enable authentication option.

  5. Click Save. You are prompted to enter a replacement password for the users.

  6. Enter and confirm the password and then click Save. A Welcome E-mail which includes the replacement password is sent to the select users.

  7. After initial login with this temporary replacement password, users are prompted to change it.

Change Password Restriction

Users of the MiCollab End User portal or MiCollab Clients (Desktop Client, Web Client, PC Client, Mobile Client and the Web portal page) cannot change their Active Directory (AD) password.

There are some situations where an AD password change is enforced by the AD server. Whenever this is the case, users cannot fulfill the request of changing the password from the MiCollab Clients; therefore, they cannot login until they change their password from an Active Directory terminal (for example, from their Windows PC). After their login and password is changed, users are once again able to login via the MiCollab End User portal or MiCollab Client.

The following activities trigger a password change which cannot be automatically resolved from the MiCollab Clients:

  • A password lifetime policy which requires the password to be changed within a predefined interval. This is only an issue for the user if the password expires before it is changed on another Active Directory terminals. Windows normally warns a user several days before the password needs to change.
  • A new user is created on the AD server and the “User must change password at next logon” is set (see screen below). In this case the user must first log into a terminal which allows a password change.

  • The admin resets the password on the AD server and the “User must change password at next logon” option is enabled (see screen below).