When standard authentication is used against a Strategy Intelligence Server 9.x installation, users' group memberships are simple to handle because there is only one source for group membership information: the Strategy Metadata. The Strategy user and group editors accurately reflect the user and group relationships that exist in the metadata.
Lightweight Directory Access Protocol (LDAP) integration introduces another source -- the LDAP server -- of user and group membership data. Since there are two user/group repositories, conflicts may arise, in terms of representation in the Strategy interface and application of user privileges within a user session.
Visual representation
In the Strategy Intelligence Server, visual representation of user and group relationships follows one simple rule. Only those relationships that exist in the metadata are ever displayed in the user and group editors.
The consequences for LDAP integration are as follows:
With LDAP integration, the expected usage is that user security will be administered through the LDAP server. Strategy uses the information in the LDAP server, but does not mirror group memberships in the metadata. This way, Strategy can adapt to changes in the user/group structure in the LDAP server automatically.
Manually assigning groups in Strategy specifies that the user should be a member of that group every time that user logs in, regardless of the LDAP server's data. A group membership that exists in the metadata, and which is displayed in the User Editor, thus has a different meaning from a group membership declared in the LDAP server alone. Metadata user-group relationships are not automatically removed from the metadata if the user is removed from a group in the LDAP server. They should be considered permanent, where group memberships in the LDAP server may change independently.
Application of user privileges to a user session
Every time a user authenticates against a Strategy Intelligence Server 9.x, a set of user privileges is assigned to the user session. The enabled privileges determine what options are available to the user for the duration of that session. The privileges persist until the session ends (either through logout or timeout), and the privileges are reevaluated the next time the user logs in.
In LDAP integration, the authentication procedure is as follows:
The user session, then, has the sum total of all the privileges that derive from group memberships in the Strategy Metadata as well as in the LDAP server.
A typical security configuration for LDAP integration includes the following elements:
Effectively, creating additional group memberships in the Strategy Metadata takes some degree of control away from the LDAP server over the group memberships that apply at login time. It is impossible for the LDAP server to deny privileges that have been manually assigned in the metadata. Manual assignment should be reserved for privileges that users should always have, regardless of the state of the LDAP server.
Thus it might be clearer why Strategy does not display LDAP group memberships in the Strategy User Editor.