The Directory Synchronization service is a component on the PGP Encryption Server (Symantec Encryption Management Server) that will allow it to query your Active Directory or LDAP directory.
It allows the PGP Encryption server to query users and associated AD objects and is the typical configuration for most environments due to the ease of use and convenience.
This article will go over what it takes to add a Directory Sync service for your own internal directory.
Directory Synchronization allows you to assign different user policy to specific internal user groups. When using Directory Synchronization, Internal Users come only from the directory you specify when you enable Directory Synchronization. During enrollment, if a user exists in the directory, they are added to the system as internal users and placed in the corresponding policy for their user account.
Important Tip: The PGP Encryption Server supports LDAPv2, LDAPv3. LDAPS is highly recommended for secure communications from the PGP server to the LDAP directory.
Because authentication operations are taking place behind the scenes with sensitive information. Because LDAPS relies on TLS, certificates are used and hostnames must be able to be resolved properly. Although LDAP can use an IP address for of the domain controller, when using LDAPS, ensure you use the FQDN of the DC or the connections will fail. See the following article for more information:
197991 - PGP Encryption Server Directory Synchronization cannot use IP address for LDAPS
You can use any of a number of directories with the PGP Encryption Server, although directories that more closely conform to the OpenLDAP or X.500 standards work best.
Bind DN User Requirement
Ensure the Bind DN user has the appropriate permissions in order to traverse the LDAP directory (Active Directory). This user is in charge of finding users for authenticating them that they are proper users, and if it can't find users, then other processes can fail, such as user enrollment and grouping. You can use Softerra LDAP Browser to get another perspective of binding to the user.
Enable LDAP Directory Synchronization
Note: The LDAP directory types include: Active Directory and OpenLDAP (RFC 1274)
Multiple-Domain Environments
If you have multiple domains, you can add more Active Directory entries to cover those domains.
If you have a Global Catalog that will provide searchability to both or all of your domains, use a Global Catalog instead of a single Active Directory--this may help speed up the lookups.
If a global catalog is not an option to enter here, simply add another directory for your other domain and each of the directories will be searched.
In addition to the above Directory Synchronization, ensure that the domain you would like to manage are also added to the "Managed Domains" list on the PGP server:
Once the above values have been added, both domains will be queried, and each of the applicable domains will be allowed to enroll to the PGP server for your users.
If you have any difficulty getting this configured, review the steps and if you still run into issues, reach out to Symantec Encryption Support for further guidance and troubleshooting.
153670 - PGP Encryption Server Administrator Roles (Symantec Encryption Management Server)
180239 - HOW TO: Enable Directory Synchronization on the PGP Encryption Server (Symantec Encryption Management Server)
180156 - Obtain the Base DN or Bind DN Attributes for LDAP Directory Synchronization for PGP Encryption Server
153425 - Troubleshooting: PGP Encryption Desktop Client Enrollment (Symantec Encryption Desktop)
171744 - PGP Administrator Password Complexity Enforcement via Passphrase Authentication (Manual Password Assignment)
216163 - Reset Password for Administrators on Symantec Encryption Management Server (PGP Server)