Use LDAP or Active Directory integration for centralized login and role mapping.
- Infram binds using the configured service account (
bindDN). - Infram searches for the user with
userSearchFilter. - User credentials are validated against the discovered entry.
- Local account fields are synchronized from LDAP attributes.
- Admin privileges are resolved via configured group mapping.
Configure under Settings -> Authentication -> LDAP Provider:
namehostport(389LDAP,636LDAPS)bindDNbindPasswordbaseDNuserSearchFilter(must include{{username}})usernameAttribute
Useful defaults:
userSearchFilter:(uid={{username}})usernameAttribute:uidfirstNameAttribute:givenNamelastNameAttribute:snemailAttribute:mail
| Directory | User Search Filter |
|---|---|
| Active Directory | (sAMAccountName={{username}}) |
| OpenLDAP | (uid={{username}}) |
| Email login pattern | (mail={{username}}) |
Use these fields for elevated role mapping:
adminGroupDNs: explicit allow-list of admin groupsgroupSearchBaseDN: group search rootgroupSearchFilter: default(member={{dn}})groupNameAttribute: defaultcngroupMemberAttribute: defaultmember
- Set
useTLS=truefor LDAPS deployments. - Keep
STRICT_TLS=truein production so LDAP server certificates are verified. - Only disable strict TLS in isolated troubleshooting scenarios.
Provider timeout fields:
connectionTimeoutMs(default10000)searchTimeoutMs(default10000)
Increase values for high-latency links or large directory trees.
- Save provider settings.
- Run Test Connection.
- Run Test Users and verify:
- expected users are discovered
- usernames are unique and deduplicated
- admin candidate mapping behaves as expected
- Perform an end-to-end login test with a non-admin and admin user.
ECONNREFUSED: LDAP host/port unreachable.INVALID_CREDENTIALS: incorrect bind credentials.- No users found: verify
baseDNanduserSearchFilter. - Admin role missing: verify
adminGroupDNsand group search fields. - TLS handshake failure: verify LDAP certificate chain and
STRICT_TLSpolicy.