Mapping groups from a directory server

If you are provisioning users from a directory server, you can maintain permission groups in Jive or use your LDAP permission groups.

Before you begin, make sure you have an active connection to an LDAP directory server in the Server Configuration tab to see the other configuration tabs. For more information, see Overview of directory server integration steps.

Fastpath:
  • Admin Console > People > Directory Server, than the Group Mapping tab
  • Advanced Admin Console > People > Settings > Directory Server Settings, than the Group Mapping tab
Important:

Recommendations for synchronizing permission groups:

  • When syncing LDAP groups to Jive, you should sync only the groups used by Jive. If you leave the Group Filter with the default setting, Jive will sync all groups a user is assigned to in LDAP.
  • Maintaining less than 500 Jive user groups simplifies administration and minimizes any performance impact from having too many groups.
  • After mapping groups from a directory server, you need a migration strategy to switch back to Jive for maintaining groups.

To connect your LDAP groups to Jive:

  1. Go to the directory server configuration page:
    • Admin Console > People > Directory Server
    • Advanced Admin Console > People > Settings > Directory Server Settings
  2. Make sure you defined a valid connection to an LDAP directory server in the Server Configuration tab.
    If you don't have a working connection established, you won't be able to see the rest of the configuration tabs.
  3. If necessary, define and save user mappings. For more information, see Mapping users from a directory server.
  4. In the Group Mapping tab, select Use LDAP to manage Groups and provide the group mapping information for your directory server.
  5. Click Test Settings to validate group mappings against the directory server.
  6. Click Save to save group mapping.
Note: A LDAP group is synced into Jive only when a user from that LDAP group logs into your community. For more information, see Synchronizing LDAP users.