Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Active Directory connector uses the LDAP protocol internally to communicate with AD domain controllers. It shares the same configuration field set as the LDAP connector with defaults and conventions optimized for Active Directory environments. The key difference is the connector type, which determines internal handling specific to Active Directory.Use Cases
- Unify SSO for AD-dependent applications — Extend single sign-on to applications that rely on AD domain credentials, Kerberos, or NTLM without rewriting the application or migrating users out of Active Directory
- Consolidate AD with cloud IdPs — Route AD-bound applications through the Orchestrator alongside cloud IdP applications, reducing the number of standalone identity integrations and simplifying licensing
- AD-to-cloud failover — Pair with the Continuity connector to fail over between Active Directory and a cloud IdP, ensuring authentication continues during outages on either side
- AD attribute enrichment — Retrieve AD user attributes (display name, group memberships, email, department) for header injection, claim enrichment, or policy evaluation in legacy and modern applications
Setup
- Console UI
- Configuration
To create a Microsoft Active Directory connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Microsoft Active Directory.
- Enter a Name for the connector.
- Enter one or more URLs for the Active Directory server (e.g.,
ldaps://dc1.corp.example.com:636). Multiple URLs enable domain controller failover. - Enter the Service Account Username (bind DN used to connect to the server).
- Enter the Service Account Password.
- Enter the Base DN for LDAP searches (e.g.,
dc=corp,dc=example,dc=com). - Enter the OUD Search Key — the attribute used to filter on during query and bind operations. For Active Directory, use
sAMAccountName.
The Console labels this field OUD Search Key. It maps to the
usernameSearchKey field in the YAML configuration.- Optionally select an Authentication Search Scope from the dropdown.
- Optionally set a Login URL for a custom endpoint for posting user credentials.
- Optionally set Custom Login HTML to present a custom page for authentication.
- Optionally set a CA Path for the certificate authority when using self-signed certificates.
- Click Save.
AD-Specific Notes
- Use
sAMAccountNameas theusernameSearchKey— In Active Directory environments, users typically log in with theirsAMAccountName(e.g.,jsmith), not theuidattribute used by generic LDAP directories. - Multiple
urlentries support domain controller failover — List multiple domain controller URLs to ensure authentication continues if a DC becomes unavailable. The Orchestrator will try each URL in order. - For LDAPS, ensure the TLS profile includes AD’s root CA — Active Directory Certificate Services (AD CS) often uses an internal CA. The TLS profile referenced by the
tlsfield must include this CA certificate viacaFile. - Common AD attributes —
sAMAccountName(login name),mail(email),displayName(full name),memberOf(group memberships),department,title,manager.
Troubleshooting
- Service account permissions — The service account must have read access to the
baseDNsubtree. In AD, this typically means the account needs “Read all properties” permission on user objects in the target OU. - LDAPS certificate trust — AD domain controllers use certificates issued by AD CS. Export the root CA certificate and include it in the TLS profile. Without it, LDAPS connections will fail with certificate verification errors.
- Distinguished Name format — AD uses a specific DN format with OUs (e.g.,
cn=svc-maverics,ou=Service Accounts,dc=corp,dc=example,dc=com). Verify the exact DN usingdsqueryor Active Directory Users and Computers. - Group membership depth — The
memberOfattribute only shows direct group memberships, not nested groups. For nested group resolution, consider using a group search filter or a Service Extension.