Basic or LDAP Authentication

This section describes how to configure authentication for remote access to the Service Virtualization standalone Server and Service Virtualization Management.

Basic authentication

This section describes how to configure basic authentication.

By default, Service Virtualization Server and Service Virtualization Management use basic authentication, accessing user data stored in the following locations:

  • Windows. Windows system accounts (Windows Active Directory)

  • Linux. File specifying users and Access Control Lists (ACL)

To define basic authentication:

  1. In an editor, open the the Service Virtualization Server configuration file (%[INSTALLLOCATION]%\Server\bin\HP.SV.StandaloneServer.exe.config) file.

  2. Define the membershipProviderConfiguration element:

    Note: The following table provides details for both basic and LDAP authentication (marked accordingly).

    Attribute Description

    Type of authentication.

    Supported values:

    • Basic authentication: Windows, UsersFile

    • LDAP authentication: Ldap

    Note: If you specify Ldap, you must configure the ldapMembershipProviderConfiguration element, as described in LDAP authentication. This enables you to use LDAP authentication instead of basic authentication.


    The label of the user name field in the Service Virtualization Management login page, for example:

    • Basic authentication: Windows user name

    • LDAP authentication: <Company> email address

    By providing a hint in the label, users are more likely to enter the correct credentials. This is especially useful in companies where users use different credentials to log on to various corporate applications.


    Time after which changes, such as user or password cache deactivation, take effect.

    Format: hh:mm:ss

    When a user logs on successfully, the user data is cached to reduce communication with the authentication server (LDAP, Windows Active Directory).

Example for basic authentication in Windows:

	loginUsernameTitle="Windows user name"	

Back to top

LDAP authentication

This section describes how to use LDAP authentication instead of the default, basic authentication for remote access to Service Virtualization Server and Service Virtualization Management.

To use LDAP authentication:

  1. Set up an LDAP server for your users, as described in your LDAP server documentation.
  2. In an editor, open the the Service Virtualization Server configuration file (%[INSTALLLOCATION]%\Server\bin\HP.SV.StandaloneServer.exe.config) file.

  3. Define the membershipProviderConfiguration element, as described in Basic authentication, making sure to specify Ldap.

  4. Define an additional ldapMembershipProviderConfiguration element to configure the LDAP connection.

    Attribute Description

    The URL of the LDAP server.

    Example: ldap://,DC=Com

    Note: The value must be url-escaped, so, for example, set all white spaces to %20.


    Credentials to use when browsing LDAP during the login.

    Note: Many LDAP servers require a full DN in connectionUsername. The value must not be url-escaped. The user must have read access to all LDAP entries under usersSearchBase.


    Password of the user specified by connectionUsername. If a password encryption feature is enabled during installation, then the encrypted password may be stored in the enc-connectionPassword attribute.

    Use the following command to encrypt the LDAP password:
    ConfigTool.exe enc-printEncryptedValue server [LDAP password]


    LDAP filter string to search for LDAP user entry during login.

    The search is performed inside the LDAP entry denoted by ldapProviderUrl and usersSearchBase combined. The $login$ string references the name that the user entered on the login page. The user found is then used to perform the actual login operation (LDAP bind operation). The LDAP entry's DN is used for the bind operation.


    Users base DN.

    • If defined, users are retrieved only from the LDAP subtree denoted by this DN. This DN must be relative to the root specified by ldapProviderUrl.
    • If omitted, the users base DN is assumed empty. Instead, user searches are performed under the entry denoted by ldapProviderUrl.


    ACL definition groups.

    For details, see Server authentication.

Example for LDAP configuration in Windows:

  loginUsernameTitle="MyCompany primary e-mail address"

Back to top