Skip to main content
The LDAP connector integrates the Maverics Orchestrator with LDAP-based directory services — including OpenLDAP and other LDAP-compliant directories. For Microsoft Active Directory environments, see the dedicated Active Directory connector.
Console terminology: In the Maverics Console, this section is called Identity Fabric. The YAML configuration uses the connectors key to define identity provider integrations.

Overview

The LDAP connector (type: ldap) supports both LDAP and LDAPS (LDAP over TLS) protocols for secure directory integration. It can perform authentication via LDAP bind operations, attribute lookups for authorization decisions, and user attribute retrieval for header injection or claim enrichment. The connector includes attributeMapping to translate between LDAP attribute names and Orchestrator-friendly names.

Use Cases

  • Legacy directory integration — Connect applications to existing LDAP directories without modifying the application
  • Attribute lookups — Retrieve user attributes from LDAP for header injection, claim enrichment, or authorization decisions
  • LDAP authentication — Authenticate end users via LDAP bind operations against the directory

Configuration

Console UI documentation is coming soon. This section will walk you through configuring this component using the Maverics Console’s visual interface, including step-by-step screenshots and field descriptions.
LDAP configuration screen in Maverics Console

Configuration Reference

KeyTypeRequiredDescription
namestringYesUnique connector identifier referenced by app policies and attribute providers
typestringYesMust be ldap
urlstring[]YesLDAP server URLs — supports ldap:// (port 389) and ldaps:// (port 636); multiple URLs enable failover
serviceAccountUsernamestringYesBind DN for the service account (e.g., cn=admin,dc=example,dc=com)
serviceAccountPasswordstringYesService account password — use secret reference syntax <namespace.key>
baseDNstringYesBase DN for LDAP searches (e.g., dc=example,dc=com)
usernameSearchKeystringNoLDAP attribute used for username lookup (e.g., uid for OpenLDAP, sAMAccountName for AD)
userRDNKeystringNoRelative Distinguished Name key for user entries
enableAuthenticationbooleanNoEnable LDAP bind authentication for end users
loginUrlstringNoURL for the LDAP login form
authenticationSearchScopestringNoLDAP search scope for authentication queries
userAttributesstring[]NoLDAP attributes to retrieve during searches (e.g., ["cn", "mail", "memberOf"])
objectClassesstring[]NoObject classes for the LDAP search filter (e.g., ["inetOrgPerson"])
attributeMappingmapNoMap Orchestrator attribute names to LDAP attribute names (e.g., email: "mail")
attributeDelimiterstringNoDelimiter for multi-valued LDAP attributes (default: ",")
groupBaseDNstringNoBase DN for group searches
groupSearchFilterstringNoLDAP filter for group membership queries
customLogin.templateFilestringNoPath to a custom HTML login form template
tlsstringNoNamed TLS profile for LDAP connection
healthCheckobjectNoHealth check monitoring configuration (see Identity Fabric Configuration Reference)
For the complete connector field reference including health check details, see Identity Fabric Configuration Reference.
The LDAP connector supports attributeMapping to translate between LDAP attribute names and Orchestrator attribute names. For example, mapping email: "mail" allows you to reference the attribute as ldap.email in header templates and policy rules, even though the LDAP directory stores it as mail. OIDC-based connectors do not have this field — they use claims directly from the OIDC token.

Troubleshooting

  • Test LDAP connectivity from the Orchestrator host — Use ldapsearch or a similar tool to verify the Orchestrator can reach the LDAP server on the configured port. Network firewalls or DNS issues are common causes of connection failures.
  • Verify the service account has read permissions on the baseDN — The bind DN specified in serviceAccountUsername must have sufficient permissions to search the baseDN subtree and read the attributes listed in userAttributes.
  • For LDAPS, ensure the TLS profile includes the correct CA certificate — If the LDAP server uses a private CA, the TLS profile referenced by the tls field must include the CA certificate via caFile. Self-signed certificates require insecureSkipVerify: true (not recommended for production).
  • Check attribute names in mapping — LDAP attribute names are case-insensitive in the protocol but must match the directory schema. Common sources of confusion: mail vs email, cn vs commonName, sAMAccountName vs uid.