Authentication Setup

Step by Step guide to SSO Setup with LDAP Authentication

This article is designed to configure LDAP with OvalEdge. In order to authenticate your users against Windows, you need to feed some properties to the OvalEdge application.

Required Properties

To configure Your LDAP with OvalEdge application the properties you need are: 

  2. Port number

After collecting the properties, please follow the below steps carefully to set up SSO with LDAP Authentication.

Any kind of discrepancies in configuration file may hinder the application execution.

Steps to Configure LDAP Authentication 

  • Please update the LDAP information in, values in bold must be updated. 













After updating the details in the the file will be displayed as below:


  • LDAP users must have one of the OvalEdge Roles to get the authorization to data objects in OvalEdge. 
    • Let’s say OE_ADMIN, OE_METAREAD, OE_METAWRITE, etc., roles are set up in OvalEdge. If we set up and add any of these roles to a user in LDAP, upon login to ovaledge application, the corresponding Roles get automatically assigned to the user. 
    • If a user login to the OvalEdge application with LDAP credentials and without any Roles, OE_PUBLIC role will be assigned to the user.
    • If the Administrator assigns some role to a user in the OvalEdge application and it is not configured/added to the user in LDAP, it will be removed upon login to the application. 
  • OvalEdge supports HYBRID model as well. 
    • Authentication is handled by LDAP and OvalEdge takes care of authorization. 
    • In this case, we don’t need to create or add any Roles to Users in LDAP. It can be handled completely within the OvalEdge. 
    • The application will only check the Authentication and add/ update the users based on information(Username, Firstname, Last Name, EmailId) received upon login. 
    • To support Hybrid model, we need to set roles.source as ovaledge, otherwise, keep as ldap
  • Sometimes, LDAP roles will be prefixed by a fixed string by some Administrators.
    Example: all roles are prefixed with GT_(GT_OE_ADMIN, GT_OE_PUBLIC). In this scenario, we must configure GT_ as Custom Role Prefix (ldap.customRolePrefix). 
  • Add the below entry in VM Arguments (

  • Start the server, and log in with LDAP Username and Password.

Now you will be connected to the OvalEdge application with LDAP Authentication.

Copyright © 2023, OvalEdge LLC, Peachtree Corners GA USA