Skip to main content

Generic LDAP

Description

The Generic LDAP connector scans any RFC-compliant LDAP directory — including OpenLDAP, NetIQ eDirectory, 389 Directory Server, Oracle Directory Server, and IBM Security Directory — to discover user entries, group entries, and group memberships. Unlike the Active Directory connector (which is optimised for AD-specific schema), this connector is fully configurable for any LDAP schema.

System Type Classification

FieldValue
System TypeDirectory Service
Default Scan Priority10 (scanned first)

Version Support

OrbisID EditionSupported
CommunityYes
ProYes
EnterpriseYes

Supported Protocol

ProtocolPortNotes
LDAP389 TCPPlaintext — development/testing only
LDAPS636 TCPTLS — recommended for production

What OrbisID Discovers

DataSource
User entriesConfigurable LDAP search filter (default: `(
Account status (disabled)pwdAccountLockedTime, nsAccountLock, loginDisabled attributes
Group entriesConfigurable filter (default: groupOfNames, groupOfUniqueNames, posixGroup)
Group membershipsConfigurable member attribute (member, uniqueMember, or memberUid)

Connection Requirements

Credential Requirements

OrbisID performs a bind using the supplied credentials. The bind account must have read access to user and group entries under the configured base DN.

Recommended: Create a dedicated read-only service account (e.g., cn=orbisid-reader,dc=example,dc=com).

Credential Mapping

OrbisID FieldLDAP Value
credential.usernameBind DN (e.g., cn=admin,dc=example,dc=com)
credential.passwordBind password

System Attributes

AttributeRequiredDefaultDescription
ldapBaseDnYesBase DN for all searches (e.g., dc=example,dc=com)
ldapUseSslNofalseSet to true to connect via LDAPS (port 636)
ldapUserFilterNo`((objectClass=inetOrgPerson)(objectClass=person))`
ldapGroupFilterNo`((objectClass=groupOfNames)(objectClass=groupOfUniqueNames)(objectClass=posixGroup))`
ldapUsernameAttrNouidAttribute that holds the username (use cn or sAMAccountName for some directories)
ldapGroupMemberAttrNomemberAttribute on group entries that lists members by DN (use memberUid for posixGroup)

Network Requirements

RequirementDetail
Port 389 or 636Must be accessible from the OrbisID server or On-Premise Agent
LDAPS certificateIf using LDAPS, the directory server certificate must be trusted

Configuration Steps

  1. Create or identify a read-only bind account in the directory
  2. Create a Credential in OrbisID:
    • Username: Full bind DN (e.g., cn=orbisid-reader,ou=service,dc=example,dc=com)
    • Password: Bind password
  3. Navigate to Systems → Add System
  4. Fill in the fields:
FieldValue
NameDescriptive name (e.g., OpenLDAP – ldap.example.com)
Hostname / IPLDAP server hostname or IP
Port389 (LDAP) or 636 (LDAPS)
OS TypeLDAP
System TypeDirectory Service
CredentialThe bind account credential
  1. Add the required ldapBaseDn system attribute and any optional schema configuration attributes
  2. Click Test Connection to verify bind and connectivity
  3. Click Save
Schema Configuration

Different LDAP implementations use different attribute names. Common adjustments:

  • OpenLDAP: ldapUsernameAttr=uid, ldapGroupMemberAttr=member
  • eDirectory: ldapUsernameAttr=cn, ldapGroupMemberAttr=member
  • posixGroup: ldapGroupMemberAttr=memberUid (uid values, not DNs)
  • groupOfUniqueNames: ldapGroupMemberAttr=uniqueMember

Troubleshooting

SymptomLikely CauseResolution
LDAP bind failed – invalid credentialsWrong bind DN or passwordVerify the full bind DN (including dc components) and password
LDAP base DN not foundWrong base DNCheck the base DN; test with an LDAP browser (Apache Directory Studio)
Connection errorPort blocked or server not listeningVerify host, port, and firewall rules
No users foundWrong user filter or wrong base DNTest the search filter with an LDAP browser using the same base DN
No group membershipsWrong member attributeCheck whether groups use member, uniqueMember, or memberUid and set ldapGroupMemberAttr accordingly
Certificate error (LDAPS)Untrusted server certificateInstall the LDAP server's CA certificate on the OrbisID host, or switch to port 389 for testing