Skip to main content
The LDAP Authentication connector integrates the Maverics Orchestrator with LDAP-based directory services — enabling user authentication via LDAP bind operations. For attribute-only lookups without authentication, see LDAP Attribute Provider. For Microsoft Active Directory environments, see the dedicated Active Directory connector.
Console terminology: In the Maverics Console, this section is called Identity Fabric. The YAML configuration uses the connectors key to define identity provider integrations.

Overview

The LDAP Authentication connector supports both LDAP and LDAPS (LDAP over TLS) protocols for secure directory integration. It authenticates end users via LDAP bind operations against the directory. For attribute-only lookups without authentication, see the LDAP Attribute Provider.

Use Cases

  • Legacy app SSO with on-premises directories — Extend single sign-on to applications that authenticate against LDAP directories, without rewriting the application or migrating users out of the directory
  • IdP consolidation for LDAP-dependent apps — Route authentication through the Orchestrator so LDAP-bound applications can participate in a unified authentication layer, reducing the need for standalone LDAP integrations per app
  • Hybrid identity bridge — Combine LDAP bind authentication with cloud IdP sessions so users in on-premises directories can access both legacy and modern applications through a single login experience
  • Combined authentication and attribute retrieval — Authenticate users and retrieve directory attributes (group memberships, email, department) in a single connector for header injection or policy evaluation

Setup

To create an LDAP Authentication connector in the Maverics Console:
  1. Navigate to Identity Fabric in the Console sidebar.
  2. Click Create and select LDAP Authentication.
  3. Enter a Name for the connector.
  4. Enter the URL of the LDAP server (e.g., ldaps://ldap.example.com:636).
  5. Enter the Service Account Username (bind DN used to connect to the server).
  6. Enter the Service Account Password.
  7. Enter the Base DN for LDAP searches (e.g., dc=example,dc=com).
  8. Enter the Username Search Key — the attribute used to filter on during query and bind operations (e.g., uid for OpenLDAP, sAMAccountName for AD).
  9. Optionally select an Authentication Search Scope from the dropdown to control the search depth.
  10. Optionally set a Login URL for a custom endpoint for posting user credentials. If unset, the form submits to a default location of /.ldap-login.
  11. Optionally set a CA Path for the certificate authority when using self-signed certificates.
  12. Click Save.

Troubleshooting

  • Test LDAP connectivity from the Orchestrator host — Use ldapsearch or a similar tool to verify the Orchestrator can reach the LDAP server on the configured port. Network firewalls or DNS issues are common causes of connection failures.
  • Verify the service account has read permissions on the baseDN — The bind DN specified in serviceAccountUsername must have sufficient permissions to search the baseDN subtree and read the attributes listed in userAttributes.
  • For LDAPS, ensure the TLS profile includes the correct CA certificate — If the LDAP server uses a private CA, the TLS profile referenced by the tls field must include the CA certificate via caFile. Self-signed certificates require insecureSkipVerify: true (not recommended for production).
  • Check attribute names in mapping — LDAP attribute names are case-insensitive in the protocol but must match the directory schema. Common sources of confusion: mail vs email, cn vs commonName, sAMAccountName vs uid.