Skip to main content

Active Directory

Description

The Active Directory connector scans a Windows domain controller via LDAP or LDAPS to discover user accounts, computer accounts, group memberships, and privilege assignments. It is the primary source of identity data in most OrbisID deployments and is typically scanned first within any scan policy.

System Type Classification

FieldValue
System TypeDirectory Service
Default Scan Priority10 (scanned first)

Version Support

OrbisID EditionSupported
CommunityYes
ProYes
EnterpriseYes

Active Directory scanning is available in all editions.

Supported Protocols

ProtocolPortEncryptionRecommendation
LDAP389 TCPNoneDevelopment / testing only
LDAPS636 TCPTLSRecommended for production

What OrbisID Discovers

DataSource
User accountsobjectClass=user
Computer accountsobjectClass=computer
Group membershipsmemberOf attribute
Nested group membershipsRecursive member resolution
Account status (enabled/disabled/locked)userAccountControl flags
Password never expiresuserAccountControl flags
Last logon timestamplastLogonTimestamp
Service accountsservicePrincipalName attribute presence
Administrative group membersDomain Admins, Enterprise Admins, Schema Admins, Administrators

Connection Requirements

Credential Requirements

The credential used for scanning must be a domain account with read access to the directory.

Minimum permissions:

  • Member of Domain Users (default read access is sufficient for most data)
  • Read access to the domain partition in Active Directory

For more comprehensive discovery (including all attributes and nested groups), a standard domain user account is typically sufficient. No elevated privileges are required.

Network Requirements

RequirementDetail
DNS resolutionThe domain controller hostname must resolve from the OrbisID server (or On-Premise Agent)
Port 389 or 636Must be accessible from the OrbisID server or agent
LDAPS certificateIf using LDAPS (port 636), the domain controller certificate must be trusted

Configuration Steps

  1. Navigate to Systems in the sidebar
  2. Click Add System
  3. Fill in the fields:
FieldValue
NameDescriptive name (e.g., corp.example.com)
Hostname / IPFQDN or IP of the domain controller
Port389 (LDAP) or 636 (LDAPS)
OS TypeActive Directory
System TypeDirectory Service
CredentialA domain account with directory read access
  1. Click Test Connection to verify connectivity and authentication
  2. Click Save
LDAPS Recommended

Use LDAPS (port 636) in production environments to encrypt credentials in transit. If the domain controller uses an internal CA, ensure the CA certificate is trusted by the OrbisID server.

Troubleshooting

SymptomLikely CauseResolution
Connection test fails with LDAP: error code 49Invalid username or passwordVerify the credential is correct and the account is not locked
Connection test fails with Connection refusedPort blocked or wrong hostnameCheck network connectivity and firewall rules on port 389/636
Connection test fails with certificate errorLDAPS certificate not trustedInstall the domain CA certificate on the OrbisID host or switch to LDAP for testing
Scan completes but no accounts foundIncorrect base DN or restricted accountVerify the credential has read access; check LDAP base DN configuration
Missing group membershipsIncomplete traversalNested group resolution requires read access to all referenced groups