Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The LDAP Attribute Provider functions as a read-only attribute source. Unlike the LDAP Authentication connector, the attribute provider does not authenticate users — it retrieves user attributes from the directory using a service account. This is useful when authentication is handled by a separate identity provider (e.g., OIDC or SAML) and you need to enrich the user’s session with directory attributes.Use Cases
- Unified SSO with LDAP-sourced attributes — Enrich cloud IdP sessions with on-premises directory data (department, title, group memberships) so applications receive consistent headers and claims regardless of where authentication happens
- Authorization from directory group memberships — Retrieve LDAP group memberships to drive fine-grained authorization decisions in Orchestrator policies, bridging access control between legacy directories and modern apps
- Cross-directory identity enrichment — Combine OIDC or SAML authentication from one provider with attribute lookups from an LDAP directory, enabling applications to access identity data that spans multiple systems
- Simplify IdP migration with attribute continuity — During IdP consolidation, maintain access to on-premises directory attributes even after shifting authentication to a cloud provider
Configuration
- Console UI
- Configuration
To create an LDAP Attribute Provider connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select LDAP Attribute Provider.
- Enter a Name for the connector.
- Enter the URL of the LDAP server (e.g.,
ldaps://ldap.example.com:636). - Enter the Base DN for LDAP searches (e.g.,
dc=example,dc=com). - Enter the Service Account Username (bind DN used to connect to the server).
- Enter the Service Account Password.
- Optionally set an Attribute Delimiter for multi-valued attributes (default:
,). - Enter the OUD Search Key — the attribute used for looking up user and group data.
- Click Save.
Troubleshooting
- Test LDAP connectivity from the Orchestrator host — Use
ldapsearchor a similar tool to verify the Orchestrator can reach the LDAP server on the configured port - Verify the service account has read permissions on the baseDN — The bind DN must have sufficient permissions to search the subtree and read the configured attributes
- Check attribute names in mapping — LDAP attribute names must match the directory schema. Common sources of confusion:
mailvsemail,cnvscommonName - For LDAPS, ensure the TLS profile includes the correct CA certificate — If the LDAP server uses a private CA, the TLS profile must include the CA certificate via
caFile