Skip to main content

LDAP / Active Directory

Connect to your enterprise directory for centralized user management. Supports Microsoft Active Directory, OpenLDAP, and other LDAP-compliant directories.

Overview

LDAP integration provides:

  • Centralized user management — Users managed in corporate directory
  • Group-based roles — Map AD groups to Anaphora roles
  • No password storage — Passwords validated against directory
  • Automatic provisioning — Users created on first login

Configuration

Navigate to Settings > System Settings > Auth > LDAP to configure.

FieldDescriptionExampleRequired
URLLDAP server addressldap://ldap.forumsys.com:389Yes
Bind DNService account for bindingcn=read-only-admin,dc=example,dc=comYes
Bind credentialsService account password(stored securely)Yes
Search baseBase DN for user searchdc=example,dc=comYes
Search filterLDAP filter for user lookupuid={{username}}Yes
Group search baseBase DN for group searchou=groups,dc=example,dc=comNo
Group search filterLDAP filter for groups(member={{cn}})No
Group name propertyAttribute for group namecnNo
Reject unauthorizedEnforce TLS certificate checksfalse (unchecked)No
CACertificate authoritybase64-encoded PEMNo
KeyClient private keybase64-encoded PEMNo
CertificateClient certificatebase64-encoded PEMNo

Group to Role Mapping

Use the group search to retrieve LDAP groups and map them to Anaphora roles. In the group search filter, use {{<attribute>}} placeholders to reference attributes from the login user. Use the Group name property to specify which attribute will be used as the mapped role name.

SSL/TLS Configuration

For secure connections use LDAPS (port 636):

ProtocolPortSecurity
LDAP389Unencrypted (not recommended)
LDAPS636SSL/TLS encrypted
StartTLS389Upgraded to TLS

Provide CA, Key, and Certificate fields for TLS client authentication if required by your LDAP server.

Active Directory Specifics

Service Account

Create a dedicated service account for Anaphora:

  1. Create user in AD: anaphora-svc
  2. Set password to never expire (or manage rotation)
  3. Grant "Read all user information" permission
  4. No need for admin privileges

Debug Mode

Enable LDAP debug logging:

  1. Go to Settings > System Settings > General > General
  2. Set Log Level to debug
  3. Reproduce the issue
  4. Review logs for detailed LDAP communication

Best Practices

  • Use dedicated service account with minimal permissions
  • Always use LDAPS for encrypted connections
  • Test configuration changes in staging first
  • Map groups to roles rather than individual user assignments
  • Monitor service account for lockouts or password expiration

Next Steps

  • SAML - Add SAML SSO alongside LDAP
  • Spaces - Configure Space-based access control