powered by Jive Software

Small Guide to Active Directory Authentication with Wildfire

Hey guys,

I had a few issues trying to get Wildfire to authenticate with my Active Directory so I thought I would post a small guide for new users of Wildfire to get them on the right track.

This is a very simple guide, I’'m new to Wildfire, and I can only go by my own experience. Just let me know where I need to make modifications.


Ok here is the best way that I found to get it all going.

Step 1. Download the latest version of Wildfire Server

Step 2. Download the latest version of the client you wish to use, I used Spark for this guide.

Step 3. Find out how your domain is setup.

Here is an example with generic names

Domain Name: domain.com.au

Container: users

This tends to be where people go wrong like myself for example where I thought I had an Organisational Unit (OU) called users where in actual fact it was a container. If you get stuck here I found that the Free LDAP Browser helps out a lot.


Step 4. Install Wildfire

Step 5. Login to wildfire with the default admin account, you will set a password when you run the wizard for the first time.

Step 6. Setup some options such as the time and what not in Wildfire.

Step 7. Create a test user

Step 8. Install Spark and try to log in with the test user.

Step 9. Now that you have tested that you can login, now its time to configure the Wildfire.xml fire to authenticate with the Active Directory Server

Step 10. navigate to the wildfire.xml file, the default location in windows is c:\program files\wildfire\conf\wildfire.xml

Step 11. Open this file with your favourite editor, I like to use Crimson Editor. http://www.crimsoneditor.com

firstly, you will probably want to add the user you wish to login with to the

Ok thats what I’'ve learned so far

Couple additions:

If you have trouble figuring out how to login via LDAP, you can use ADSIEdit from the Windows Support Tools to browse your AD Domain[/b] configuration to figure out what your adminDN needs to be.

I’'ve mentioned several times in these forums about how I setup LDAP groups. One thread is here:


User sboggs[/b] offers a similar setup except he filters out disabled accounts, which I should probably do on my end as well.

It’‘s about time that got all this information together and created a Knowledge Base article for it. I know I’'m tired of providing the same advice over and over again. Thanks for the work, Stylus.