Skip to content

Commit ed90553

Browse files
authored
Merge pull request #450 from ritza-co/19.06.04
Docs 19.06.04 release (Week 22, 2025)
2 parents 08d37d9 + 42eb6e8 commit ed90553

105 files changed

Lines changed: 661 additions & 295 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

docs/administration/active-directory-and-openldap-support.mdx

Lines changed: 83 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,100 @@
11
---
2-
title: "Active Directory and OpenLDAP Support"
2+
title: "Multi-domain Active Directory and OpenLDAP Support"
33
sidebar_position: 1
44
---
55

6-
## Multi-domain Active Directory and OpenLDAP Support
6+
import ThemedImage from '@theme/ThemedImage'
7+
import useBaseUrl from '@docusaurus/useBaseUrl'
78

8-
Device42 can now be configured to work with multiple Active Directory (AD) servers. AD servers can be used for both Active Directory based logins, as well as AD synchronization.
9+
Device42 can now be configured to work with multiple Active Directory (AD) servers. AD servers can be used for both Active Directory-based logins and AD synchronization.
910

10-
AD settings can be found and configured in *Tools > Settings > Active Directory Settings*, but are only accessible to D42 **super users**. Multiple Active Directory settings and/or up to one OpenLDAP server setting can be configured at a time to properly describe your environment. Each Active Directory setting can also specify multiple domains.
11+
AD settings can be found and configured under **Tools > Settings > Active Directory Settings** and are only accessible to Device42 superusers. Multiple Active Directory settings and up to one OpenLDAP server setting can be configured at a time to properly describe your environment. Each Active Directory setting can also specify multiple domains.
1112

12-
![Select Active Directory/LDAP Settings to view](/assets/images/Active_directory_settings_menu_button.png) ![Change Active Directory Settings](/assets/images/Change_Active_directory_settings-HL.png)
13+
## Add New Active Directory or OpenLDAP Settings
1314

14-
After entering Active Directory or LDAP settings, you can test your configuration with the *'Test Connection'* button on the view page. You will be prompted for credentials to initiate the test.
15+
From the Active Directory/LDAP Settings list page, click **Create**.
1516

16-
![Test Active Directory Credentials](/assets/images/Test_AD_Connection_button.png)
17+
<ThemedImage
18+
alt="Active Directory/LDAP Settings list page"
19+
sources={{
20+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-list-page-light.png'),
21+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-list-page-dark.png'),
22+
}}
23+
/>
1724

18-
If you have selected to utilize “DomainUsername” Username Login Style, then users are required to enter both the domain and username to login into Device42
25+
Under **LDAP Type**, choose **Active Directory** or **Open LDAP**.
1926

20-
![D42 Login Using active directory Domain example](/assets/images/Login_Screen_DomainName-Backslash_username.png)
27+
<ThemedImage
28+
alt="Active Directory/LDAP Settings list page"
29+
sources={{
30+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-name-server-light.png'),
31+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-name-server-dark.png'),
32+
}}
33+
/>
2134

22-
## Manually Add Single user from Active Directory
35+
For the **Active Directory** type, choosing **Domain\Username** as your **Username login Style** reveals the **Get Referral NetBIOS** option, which returns usernames in the format `ReferralNetbios/Username`.
2336

24-
To add a single new Administrator user manually from Active Directory, simply visit the main menu, *"Tools -> Admins & Permissions -> Administrators"*. ![Add Admin User Active Directory](/assets/images/manually_add_d42_admin_user_from_AD-1.png)
37+
<ThemedImage
38+
alt="Active Directory/LDAP Settings list page"
39+
sources={{
40+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-login-style-light.png'),
41+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-login-style-dark.png'),
42+
}}
43+
/>
2544

26-
You are able to review the domain found for the user found prior to adding them, and **the new user will be added according to the currently configured "Username Login Style option"**: (previous section). ![Add Active Directory user as Admin](/assets/images/Add_AD_user_as_Admin.png)
45+
If you select **Domain\Username** as your **Username login Style**, users will be required to enter both their domain and username to log in to Device42.
46+
47+
<ThemedImage
48+
alt="AD credentials in login form"
49+
sources={{
50+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-login-light.png'),
51+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-login-dark.png'),
52+
}}
53+
/>
54+
55+
For the **Open LDAP** type, you can choose an **OpenLDAP group attribute** to identify group members. The available options are **memberUid**, **uniqueMember**, **members**, and **member**.
56+
57+
<ThemedImage
58+
alt="Active Directory/LDAP Settings list page"
59+
sources={{
60+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/openldap-attributes-light.png'),
61+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/openldap-attributes-dark.png'),
62+
}}
63+
/>
64+
65+
You can add multiple **AD/LDAP Domains** and mark them as **Default**.
66+
67+
<ThemedImage
68+
alt="Active Directory/LDAP Settings list page"
69+
sources={{
70+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-domains-light.png'),
71+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/ad-domains-dark.png'),
72+
}}
73+
/>
74+
75+
### Test Connections
76+
77+
Test a user account for permission to query AD:
78+
79+
- Save your settings to display the settings details page, then open the **ellipsis** (...) menu and select **Test Connection**.
80+
81+
<ThemedImage
82+
alt="Active Directory/LDAP Settings list page"
83+
sources={{
84+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/test-connection-button-light.png'),
85+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/test-connection-button-dark.png'),
86+
}}
87+
/>
88+
89+
- You will be prompted to provide credentials for initiating the test. Leave the credentials blank to use the currently selected username and password.
90+
91+
<ThemedImage
92+
alt="Test Connections settings prompt"
93+
sources={{
94+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/test-auth-prompt-light.png'),
95+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/test-auth-prompt-dark.png'),
96+
}}
97+
/>
2798

2899
## Configuring an Active Directory User Sync / Discovery Job
29100

docs/administration/add-an-active-directory-user-as-a-device42-administrator.mdx

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,24 +3,37 @@ title: "Add an Active Directory User as a Device42 Administrator"
33
sidebar_position: 3
44
---
55

6-
Below are the steps to create the Device42 Active Directory settings and to add AD users as Administrators for device42. Please note that there are no Active directory credentials stored in the device42 application. You will need to enter valid domain user credentials each time before you can search for a user.
6+
import ThemedImage from '@theme/ThemedImage'
7+
import useBaseUrl from '@docusaurus/useBaseUrl'
78

8-
## Process Overview Animation
9+
You can create Active Directory (AD) settings in Device42 and use them to add AD users as administrators.
910

10-
The following is an animation that overviews the process outlined below. If the animation does not open correctly, use this link: [Add Active Directory User](https://www.imgoat.com/uploads/9adc1e107f/206938.gif).
11+
First, add your AD settings under **Tools > Settings > Active Directory Settings**. See the [Active Directory and OpenLDAP](active-directory-and-openldap-support.mdx) page for details.
1112

12-
![Add scheduled AD user sync job](/assets/images/placeholder.png)
13+
Next, manually add an administrator user from the Active Directory domain you configured. Navigate to **Tools > Admins & Permissions > Administrators** and click **Create Active Directory Admin**.
1314

14-
## Add Active Directory Settings
15+
<ThemedImage
16+
alt="Create AD Admin option"
17+
sources={{
18+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/add-ad-admin-light.png'),
19+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/add-ad-admin-dark.png'),
20+
}}
21+
/>
1522

16-
![](/assets/images/ToolsSettings_Change-Active-Directory-LDAP-Settings.png)
23+
Search for an Active Directory user to add as an administrator. Device42 displays the AD domain associated with the user you searched for before you add them.
1724

18-
Go to **Tools > Settings > Active Directory Settings** and enter and save the settings for your domain. You can test these setting using the Test Active Directory Authentication section at the bottom of the AD settings page.
25+
[The **Username login Style** option](active-directory-and-openldap-support.mdx#add-new-active-directory-or-openldap-settings) selected when the AD settings were added controls how Device42 formats and recognizes usernames during login (for example, as `Domain\Username` or `username@domain`).
1926

20-
## Active Directory User Add
27+
<ThemedImage
28+
alt="Add Active Directory user as admin"
29+
sources={{
30+
light: useBaseUrl('/assets/images/active-directory-and-openldap-support/add-ad-admin-user-light.png'),
31+
dark: useBaseUrl('/assets/images/active-directory-and-openldap-support/add-ad-admin-user-dark.png'),
32+
}}
33+
/>
2134

22-
![Add Admin User Active Directory](/assets/images/manually_add_d42_admin_user_from_AD.png)
35+
Note that Active Directory credentials are not stored in the Device42 application. You need to enter valid domain user credentials each time you search for a user.
2336

2437
## Configuring the Active Directory User Discovery/sync Job
2538

26-
You may now configure an AD Sync Job to pull AD users in bulk and/or keep them synced. Proceed to [the Active Directory Discovery Job docs page](auto-discovery/active-directory-sync.mdx) to view the AD discovery process.
39+
You can configure an AD Sync Job to pull in AD user data in bulk and/or keep them synced. See [the Active Directory Discovery Job docs page](auto-discovery/active-directory-sync.mdx) to view the AD discovery process.

docs/administration/auto-clean-feature.mdx

Lines changed: 124 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -3,87 +3,160 @@ title: "Auto Clean Feature"
33
sidebar_position: 4
44
---
55

6-
## About the AutoClean Feature
6+
import ThemedImage from '@theme/ThemedImage'
7+
import useBaseUrl from '@docusaurus/useBaseUrl'
78

8-
Auto Clean rules help you manage old and possibly stale data in Device42, automatically. Should an object _(e.g. a device or an IP address)_ not be found by a subsequent autodiscovery job, or modified by a manual effort, it may be out of service. This is especially true of servers and other objects in public clouds, but can also apply to objects that are behind the corporate firewall.
9+
Auto Clean rules help you manage old and possibly stale data in Device42, automatically. Should an object (like a device or an IP address) not be found by a subsequent autodiscovery job, or modified by a manual effort, it may be out of service. This is especially true of servers and other objects in public clouds, but can also apply to objects that are behind the corporate firewall.
910

1011
The rules for when a particular type of object should be considered and the rules for what to do about such objects vary from organization to organization. This feature enables you to define your own rules and tell Device42 what actions should be taken.
1112

1213
Device42 includes several system-defined disabled Auto Clean rules (related to ADM data) as suggested examples you can use to base your own rules on. You can also enable these example rules to keep your ADM data cleaner.
1314

14-
Select **Tools > Auto Clean Rules** and then click **Add Auto Clean Rule** on the rules list page.
15-
16-
![](/assets/images/AutoClean-menu-item.png)
17-
1815
## Auto Clean Supported CIs
1916

20-
Auto Clean rules can target a wide variety of CIs _(Configuration Items)_ in Device42, including everything from Assets to users to VLANs, and everything in between. The following images list the objects supported as Auto Clean rule targets.
21-
22-
![](/assets/images/AutoClean-object-type-drop-down.png)
17+
Auto Clean rules can target a wide variety of Configuration Items (CIs), from Assets to Users to VLANs, and everything in between.
2318

24-
The available object types are:
19+
You can select the following object types as Auto Clean rule targets:
2520

26-
- Administrator
27-
- Asset
28-
- Certificate
29-
- Device
30-
- Device Certificate
21+
- Administrators
22+
- Assets
23+
- Certificate Instances
24+
- Certificates
3125
- Device Hardware Model
32-
- End User
33-
- IP Address
26+
- Devices
27+
- End Users
28+
- IP Addresses
3429
- IP NAT/Map
35-
- Listener Service Port
36-
- Operating System
37-
- Part
38-
- Port
39-
- Power Unit
40-
- Resource
41-
- Scheduled Task
42-
- Service Communication
43-
- Service Instance
44-
- Software Component
30+
- Operating Systems
31+
- Parts
32+
- Ports
33+
- Power Units
34+
- Resources
35+
- Scheduled Tasks
36+
- Service Communications
37+
- Service Instances
38+
- Service Listener Ports
39+
- Software Components
4540
- Software In Use
46-
- Subnet
47-
- VLAN
41+
- Subnets
42+
- VLANs
43+
44+
45+
## View Auto Clean Rules
46+
47+
Navigate to the Auto Clean Rules list page under **Tools > Templates & Bulk Operations > Auto Clean Rules**.
48+
49+
Note that the system rule, **Shared IPs maintenance**, uses a **Number of Days** option instead of the **Modify Search** option
50+
51+
<ThemedImage
52+
alt="Auto Clean Rules menu location"
53+
sources={{
54+
light: useBaseUrl('/assets/images/auto-clean-feature/auto-clean-rules-menu-light.png'),
55+
dark: useBaseUrl('/assets/images/auto-clean-feature/auto-clean-rules-menu-dark.png'),
56+
}}
57+
/>
58+
59+
## Create New Auto Clean Rules
60+
61+
Navigate to **Tools > Templates & Bulk Operations > Auto Clean Rules** and then click **Create**.
62+
63+
The combination of object types and the search criteria you select for those object types defines the Auto Clean rule. As you build your search criteria, the **Preview** list shows the objects that the Auto Clean rule will be applied to.
64+
65+
- Name the rule and click the **pencil icon**.
4866

49-
## Creating Auto Clean Rules
67+
<ThemedImage
68+
alt="Add Search Criteria icon"
69+
sources={{
70+
light: useBaseUrl('/assets/images/auto-clean-feature/criteria-icon-light.png'),
71+
dark: useBaseUrl('/assets/images/auto-clean-feature/criteria-icon-dark.png'),
72+
}}
73+
/>
5074

51-
Each rule specifies a type of object and provides a Modify Search function you use to define the specific objects you want to apply the rule to. The combination of object type and search criteria define the rule. The examples below show building a search for Device objects to apply a rule to.
75+
- Select an **Object Type** for the rule to target – for example, **Devices**.
5276

53-
![](/assets/images/18.06.00_auto-clean-add-device-search.png)
77+
<ThemedImage
78+
alt="Object Type dropdown"
79+
sources={{
80+
light: useBaseUrl('/assets/images/auto-clean-feature/object-type-dropdown-light.png'),
81+
dark: useBaseUrl('/assets/images/auto-clean-feature/object-type-dropdown-dark.png'),
82+
}}
83+
/>
5484

55-
You can use the basic filters (+ button) to add or remove filters for the search criteria.
85+
Build search criteria for the selected object type using the basic dropdown filters and the advanced search option.
5686

57-
![](/assets/images/18.06.00_auto-clean-add-device-search-2-filters.png)
87+
- For the Devices object type, for example, you could select **physical** under the **Type** dropdown. Click **More Filters** to display more basic dropdown filters to select values from.
5888

59-
You can also use the [Advanced Search](/getstarted/advanced-search-feature.mdx) feature (binocular button) to build a search criteria.
89+
<ThemedImage
90+
alt="Basic filter options"
91+
sources={{
92+
light: useBaseUrl('/assets/images/auto-clean-feature/type-filter-light.png'),
93+
dark: useBaseUrl('/assets/images/auto-clean-feature/type-filter-dark.png'),
94+
}}
95+
/>
6096

61-
![](/assets/images/18.06.00_auto-clean-add-device-search-3-advanced-search.png)
97+
- You can also use the [Advanced Search](getstarted/advanced-search-feature.mdx) feature to include search criteria.
6298

63-
As you build your search criteria, the Preview list in the search panel shows the objects to which the Auto Clean rule will be applied to. Click _OK_ to apply the search.
99+
<ThemedImage
100+
alt="Advanced Search option"
101+
sources={{
102+
light: useBaseUrl('/assets/images/auto-clean-feature/advanced-search-criteria-light.png'),
103+
dark: useBaseUrl('/assets/images/auto-clean-feature/advanced-search-criteria-dark.png'),
104+
}}
105+
/>
64106

65-
![](/assets/images/18.06.00_auto-clean-add-device-search-4-filter-applied.png)
107+
- Click **Add** to apply the search for the object type. You can click the **pencil icon** again to add another device and define search criteria for it.
66108

67-
(Note that the system rule _Shared IPs maintenance_ uses a Number of Days option instead of the Modify Search option.)
109+
<ThemedImage
110+
alt="Added Devices object with Advanced criteria"
111+
sources={{
112+
light: useBaseUrl('/assets/images/auto-clean-feature/added-devices-criteria-light.png'),
113+
dark: useBaseUrl('/assets/images/auto-clean-feature/added-devices-criteria-dark.png'),
114+
}}
115+
/>
68116

69-
## Auto Clean Rule Action Options
117+
### Auto Clean Rule Options
70118

71-
The available Auto Clean Rule Action options vary depending on which _Object type_ you select for the rule. The example below shows the action options for device objects.
119+
Select the actions to perform on CIs matching added object types and its criteria. The available Auto Clean Rule **Action** options vary depending on which **Object type** you select for the rule. The example below shows the action options for Device objects.
72120

73121
![](/assets/images/AutoClean-device-action-options.png)
74122

75-
- **Delete the data**: delete the object.
76-
- **Archive and delete the data**: create an archive record for the object (_Analytics > Archived Objects_) and delete the object.
77-
- **Clear all IPs**: remove IPs from the Device.
78-
- **Clear all IPs for this subnet**: clear all device IPs from the entered or selected subnet.
79-
- **Clear all Connectivity**: clear all connectivity to the device.
80-
- **Change to not in service**: set the device status as not in service.
81-
- **Change device service level to**: choose a service level to set for the device when the rule is triggered.
82-
- **Send email to**: send notification when the rule is triggered.
83-
- **Webhook AutoClean Endpoints**: add or delete webhooks to send when the rule is triggered.
123+
<ThemedImage
124+
alt="Auto Clean Rules Action options for Devices"
125+
sources={{
126+
light: useBaseUrl('/assets/images/auto-clean-feature/auto-clean-actions-light.png'),
127+
dark: useBaseUrl('/assets/images/auto-clean-feature/auto-clean-actions-dark.png'),
128+
}}
129+
/>
130+
131+
- **Delete the data:** Delete the object.
132+
- **Archive and delete the data:** Create an archive record for the object and delete the object. You can find archived records under **Analytics > Archived Objects**.
133+
- **Clear all IPs:** Remove IPs from the Device.
134+
- **Clear all IPs for this subnet:** Clear all device IPs from the entered or selected subnet.
135+
- **Clear all Connectivity:** Clear all connectivity to the device.
136+
- **Change to not in service:** Set the device status as not in service.
137+
138+
<ThemedImage
139+
alt="Auto Clean Rules Action options for Devices"
140+
sources={{
141+
light: useBaseUrl('/assets/images/auto-clean-feature/service-level-emails-light.png'),
142+
dark: useBaseUrl('/assets/images/auto-clean-feature/service-level-emails-dark.png'),
143+
}}
144+
/>
145+
146+
- **Change device service level to:** Choose a service level that the device will be set to when the rule is triggered.
147+
- **Send email to:** Send notification when the rule is triggered.
148+
149+
<ThemedImage
150+
alt="Webhook Auto Clean Endpoints box"
151+
sources={{
152+
light: useBaseUrl('/assets/images/auto-clean-feature/webhook-autoclean-endpoints-light.png'),
153+
dark: useBaseUrl('/assets/images/auto-clean-feature/webhook-autoclean-endpoints-dark.png'),
154+
}}
155+
/>
156+
157+
- **Webhook AutoClean Endpoints:** Add or delete webhooks that will be sent when the rule is triggered.
84158

85159
:::info
86160
The Auto Clean rules run once per day. If only an email or webhook is sent but no action is taken, the email or webhook will repeat each day until an action is taken that deletes or changes the object record.
87161
:::
88162

89-
![](/assets/images/AutoClean-device-webhook-section.png)

0 commit comments

Comments
 (0)