Administrators (such as the default admin
account) have access to the Administration/User page:
A checkmark in the Active column indicates if a user is currently logged in. It is not possible to delete users that are currently logged in.
The Role column indicates if a user is an administrator (either System Admin or Partition Manager) or a regular user.
The User Filter column indicates if a flow record access control filter is active.
A password reset link is provided in the context menu. It is not possible to change the password for externally authenticated users (LDAP) through FlowTraq.
An Administrator may create new users from the Partition Actions menu. From the user context menu, an Administrator may remove user accounts, make other users into Administrative Users (or remove that status), move users among partitions, add user filters, and reset user passwords.
Administrators can also set up access controls for each unprivileged user to restrict what sessions they can see when doing analytics. For more information on how to set up user access control, please see Section 4.2.1.3, “User Filter Control”.
![]() | Important |
---|---|
Upon first login, you should immediately change the password for |
You can grant and revoke administrative privileges by taking the following steps:
Log in as an Administrator.
Open the Administration/User page.
Select the user whose privileges you wish to change by clicking their username. If the user is not visible, ensure that you have administrative permissions for the correct Partition.
Select Promote Role from the context menu to grant administrative privileges.
Select Demote Role from the context menu to revoke administrative privileges.
![]() | Important |
---|---|
You cannot revoke your own administrative privileges. (This is to prevent the system from getting into a state where there are no administrators.) |
![]() | Important |
---|---|
You cannot grant or revoke administrative privileges of users that are externally authenticated (LDAP). You must change their group membership on your LDAP server instead. |
You can add and remove users by taking the following steps:
![]() | Important |
---|---|
You may not delete a user that is currently logged in. |
![]() | Important |
---|---|
Deleting an externally authenticated user will only delete their settings. To prevent an LDAP authenticated user from accessing FlowTraq you must disable their access on your LDAP server. |
![]() | User Name Rules |
---|---|
User names must conform to the following rules:
|
You must specify a FlowTraq Server to connect to and supply login details.
In addition to the connection and login parameters, ftum
accepts the following parameters:
For example, to add a new user (with the -addu
option) and set the initial password (with the -chpwd
option), take the following steps:

Using LDAP for authentication allows for a convenient way to manage access for many users at the same time from directory servers such as Active Directory. FlowTraq will treat these user accounts as external, although some local controls may still be applied. User settings such as dashboard layout and colorscheme will be stored on the FlowTraq server. It is also possible to apply user access controls to regular users, see Section 4.2.1.3, “User Filter Control”.
![]() | Important Limitations of LDAP users |
---|---|
Externally authenticating users comes with a couple of important limitations:
|
An LDAP server is configured in the flowtraq.conf
FlowTraq server daemon configuration file. After adding or removing a configuration, the FlowTraq daemon process must be sent a HUP
signal to trigger a reconfiguration. Below is an example of an LDAP configuration:

You may configure up to four LDAP server blocks srv0, srv1, srv2,
and srv3
, which will be searched in numerical order.
-
server
The IP address or hostname of the LDAP server that FlowTraq should connect to.
-
port
The TCP port of the LDAP service (389).
-
binddn
The distinguished name of the LDAP account that is used to browse the directory service. This account must have sufficient privileges to query the LDAP server for users and groups. It is used to validate that users are valid members of the directory, and belong to groups that are mapped to FlowTraq users or administrators.
-
binddnpass
The password for the LDAP account that is used to browse the directory service.
-
userbaseobject
This is the base object that holds all the relevant user accounts in the directory. This object is searched for the credentials provided by the users to FlowTraq when they log in. Usually:
OU=Users,DC=FlowTraq,DC=com
, or simplyDC=FlowTraq,DC=com
.-
useraccountattrib
The attribute of user objects that users will use to identify themselves to FlowTraq. You may pick any attribute that identifies a user in your directory. This is usually
sAMAccountName
.-
usernameattrib
This is the attribute of user objects that FlowTraq will search for and use to offer the credentials to the LDAP server for authentication. This is usually an attribute that uniquely identifies the user in the domain. A good value is
distinguishedName
.-
groupuserattrib
This is the attribute of user objects that is used in to identify membership in groups on your directory server. Often the
distinguishedName
of the user is used to identify them as members of a specific group.-
groupbaseobject
This is the base object that holds all the relevant group accounts in the directory. This object is searched for the groups provided by the user and admin mappings given by the
admin
andusers
parameters, to establish if the user who is attempting to login is a member of an appropriate LDAP group. Usually:OU=Groups,DC=FlowTraq,DC=com
, or simplyDC=FlowTraq,DC=com
.-
groupmemberattrib
This is the attribute of group objects that is used to list all the groups member users. Usually:
member
.-
groupnameattrib
This is the attribute of group objects that is used to identify them in the
admin
andusers
mappings. Usually:cn
.-
admin
List all the LDAP groups that should have administrative access to the FlowTraq daemon. You may list up to 8 groups.
-
users
List all the LDAP groups that should have regular user access to the FlowTraq daemon. You may list up to 8 groups.
![]() | Important |
---|---|
Note that it is possible to configure the same LDAP server multiple times, but with a different group mapping in each configuration. |