writer-jill commented on code in PR #13245:
URL: https://github.com/apache/druid/pull/13245#discussion_r1011634342


##########
docs/operations/auth-ldap.md:
##########
@@ -22,182 +23,279 @@ title: "LDAP auth"
   ~ under the License.
   -->
 
+You can use [Lightweight Directory Access Protocol 
(LDAP)](https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol) to 
secure access to Apache Druid. This topic describes how to set up Druid 
authentication and authorization with LDAP and LDAP over TLS (LDAPS). The 
examples on this page show the configuration for an Active Directory LDAP 
system.
 
-This page describes how to set up Druid user authentication and authorization 
through LDAP. The first step is to enable LDAP authentication and authorization 
for Druid. You then map an LDAP group to roles and assign permissions to roles.
+The first step is to enable LDAP authentication and authorization for Druid. 
You then map an LDAP group to Druid roles and assign permissions to those 
roles. After you've completed this configuration you can optionally choose to 
enable LDAPS to make LDAP traffic confidential and secure.
 
-## Enable LDAP in Druid
+## Prerequisites
 
-Before starting, verify that the active directory is reachable from the Druid 
Master servers. Command line tools such as `ldapsearch` and `ldapwhoami`, which 
are included with OpenLDAP, are useful for this testing. 
+Before you start to configure LDAP for Druid, test your LDAP connection and 
perform a sample search.
 
-### Check the connection
+### Check your LDAP connection
 
-First test that the basic connection and user credential works. For example, 
given a user `[email protected]`, try:
+Verify that your LDAP connection is working by testing it with user 
credentials. For example, the following command tests the connection for the 
user `[email protected]`. Insert your LDAP server IP address and substitute 
`389` for the port number of your LDAP instance, if different.
 
 ```bash
-ldapwhoami -vv -H ldap://<ip_address>:389  -D"[email protected]" -W
+ldapwhoami -vv -H ldap://ip_address:389  -D "[email protected]" -W
 ```
 
-Enter the password associated with the user when prompted and verify that the 
command succeeded. If it didn't, try the following troubleshooting steps:  
+Enter the password for the user when prompted and verify that the command 
succeeded. If it failed, check the following:
 
-* Verify that you've used the correct port for your LDAP instance. By default, 
the LDAP port is 389, but double-check with your LDAP admin if unable to 
connect. 
-* Check whether a network firewall is not preventing connections to the LDAP 
port.
-* Check whether LDAP clients need to be specifically whitelisted at the LDAP 
server to be able to reach it. If so, add the Druid Coordinator server to the 
AD whitelist. 
+- Make sure you're using the correct port for your LDAP instance.
+- Check whether a network firewall is preventing connections to the LDAP port.
+- Review your LDAP implementation details to see whether you need to 
specifically whitelist LDAP clients at the LDAP server. If so, add the Druid 
Coordinator server to the whitelist.
 
+### Test your LDAP search
 
-### Check the search criteria
+Once your LDAP connection is working, search for a user. For example, the 
following command searches for the user myuser in an Active Directory system. 
The `sAMAccountName` attribute is specific to Active Directory and contains the 
authenticated user identity:

Review Comment:
   @tijoparacka I don't understand this comment. Please suggest the correction.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to