The cBioPortal includes support for LDAP authentication. This document explains how to configure LDAP within your own instance of cBioPortal. Configuring your local instance to support LDAP requires a few configuration changes.
In this setup LDAP will be used as a simple Identity Provider (IDP) for the authentication.
identity provider: in this scenario, it can be limited to a service that stores user names and passwords, and provides an authentication mechanism.
service provider: any web site or web application that provides a service, but should only be available to authenticated and authorized users. In the documentation below, the cBioPortal is the service provider.
authentication: a means of verifying that a user is who they purport to be. Authentication is performed by the identify provider, by extracting the user name and password provided in a login request, and matching this with information stored in its repository. When authentication is enabled, multiple cancer studies can be stored within a single instance of cBioPortal while providing fine-grained control over which users can access which studies. Authorization is implemented within the core cBioPortal code, and not the identify provider.
The cBioPortal code has no means of storing user name and passwords and no means of directly authenticating users. If you want to restrict access to your instance of cBioPortal, you therefore have to consider an external authentication service. LDAP is one means of doing so, and your larger institution may already provide LDAP support. This greatly simplifies user management.
In portal.properties, modify the section labeled
authentication. For example:
## configuration for the LDAP accessldap.user_search_base=DC=example,DC=comldap.url=ldap://ldap.example.com:389ldap.manager.dn=ldap.manager.password=## The following attributes for are good for ActiveDirectory, for OpenLDAP use "uid" for usernameldap.attributes.username=sAMAccountName#ldap.attributes.username=uidldap.attributes.last_name=snldap.attributes.given_name=givenNameldap.attributes.email=mail
Please note that you will have to modify all the above to match your own settings. Also note, in most cases ldap.manager.dn and ldap.manager.password should be left empty, although the properties should remain in portal.properties.
Please read the Wiki page on User Authorization, and add user rights for a single user.
The login page is configurable via the
skin.authorization_message. For example in
skin.authorization_message you can be set to something like this:
skin.authorization_message= Welcome to this portal. Access to this portal is available to authorized test users at YOUR ORG. [<a href="http://thehyve.nl/">Request Access</a>].
You can also set a standard text in
skin.login.contact_html that will appear in case of problems:
skin.login.contact_html=If you think you have received this message in error, please contact us at <a style="color:#FF0000" href="mailto:email@example.com">firstname.lastname@example.org</a>
You are now ready to go.
Rebuild the WAR file and follow the Deployment with authentication steps using
Then, go to: http://localhost:8080/.
If all goes well, the following should happen:
You will be redirected to the Login Page.
After authenticating, you will be redirected the home page.
Example of Login page:
If this does not happen, see the Troubleshooting Tips below.
If you get stuck or get an obscure error message, you can try to turn on all DEBUG logging. This can be done via
src/main/resources/log4j.properties. For example:
# Change INFO to DEBUG, if you want to see debugging info on underlying libraries we use.log4j.rootLogger=DEBUG, a# Change INFO to DEBUG, if you want see debugging info on our packages only.log4j.category.org.mskcc=DEBUG
Then, rebuild the WAR, redeploy, and try to authenticate again.