LDAP Authentication

The LDAP Authentication feature allows your application to authenticate users directly against an external LDAP (Lightweight Directory Access Protocol) server. By configuring your organization’s LDAP server, users can log in using their existing corporate credentials without the need for separate accounts. This ensures centralized identity management while maintaining consistency with your organization’s IT infrastructure. The integration supports secure communication and flexible configuration to align with various directory structures and authentication policies.

LDAP Login Configuration

 

Directory Server

In the top section, enter your LDAP server address using either the DNS name or IP address, followed by the port.

Example:
ldaps://global.corp.sadevio:636

You may also define an optional secondary (fallback) LDAP server for redundancy.


Domain Bind Configuration

In the bottom section, you can configure one or more Domain Bind entries. These are used to construct the distinguished name (DN) for user lookup during authentication.

The system supports the following user identification formats:


Dynamic User Variables

You can use placeholders in your Domain Bind configuration to dynamically insert user values:


Example Domain Bind

CN=${user_name},OU=Staff,OU=Identities,DC=global,DC=corp,DC=sadevio


Notes

 

image.png

LDAP Authentication on-premise

When hosting the system on-premise, additional configuration is required to enable LDAP / Active Directory authentication.


Tomcat Service Account

The application server (Tomcat) must run under a user account that has permission to query the Active Directory.


LDAPS Certificate Configuration

If you are using LDAPS (recommended), the LDAP server’s SSL certificate must be trusted by Java.

You must import the LDAP server certificate into the Java keystore (truststore) used by Tomcat.


Steps to Import Certificate

  1. Export the SSL certificate from your LDAP / Domain Controller
  2. Import the certificate into the Java keystore using:
keytool -importcert \
-alias ldap-cert \
-file ldap_certificate.crt \
-keystore $JAVA_HOME/lib/security/cacerts

  1. Restart Tomcat after importing the certificate

Steps Using Portecle

  1. Download and start Portecle
  2. Open the Java keystore:
    • Path:
      $JAVA_HOME/lib/security/cacerts
  3. Enter the keystore password
    (Note: the default password cacerts is often changed in secure environments)
  4. Import the LDAP / Active Directory certificate:
    • Go to Tools → Import Trusted Certificate
    • Select your exported certificate file (e.g., .crt)
  5. Assign an alias (e.g., ldap-cert)
  6. Save the keystore
  7. Restart Tomcat

Important Notes


Recommendation