LDAP Provisioning
LDAP, or Lightweight Directory Access Protocol, is a protocol for accessing and managing directory services over a network. It provides a centralized, hierarchical way to store and authenticate identity-related information like user accounts, groups, and organizational data. This document outlines the formal steps to configure a Simple LDAP application in Cymmetri used for LDAP Provisioning.
Prerequisites
Before beginning the configuration, ensure you have the following:
LDAP server login credentials: Specifically, the Bind DN and password.
LDAP server access: To configure and test connections.
SSL/TLS certificates: Required for secure connections using LDAPS (LDAP over SSL). The LDAPS port (typically 636) must be enabled, and the CA certificate must be exported from the LDAP server and imported into the connector server.
LDAP Essentials
Key information needed for the configuration includes:
Server Hostname and Port: The address of the LDAP server and the port for communication (e.g., 636 for LDAPS).
Base DN (Distinguished Name): The starting point for all searches within the directory hierarchy (e.g., dc=example,dc=com).
OU (Organizational Unit) name: The name of the specific organizational unit you are targeting.
Step-by-Step Configuration
Step 1: Create a Simple LDAP Application
Navigate to Identity Hub → Application.

Click Create Application and search for "Simple LDAP."

Step 2: Create Policy Map
The policy map defines which attributes are fetched from your LDAP directory.
Go to the Policy Attribute section. The table is pre-filled with common LDAP attributes, but you can add new ones.
cn (Common Name): The full name of the user.
uid (User ID): A unique user identifier.
sn (Surname): The user’s last name.

Standard Attribute Mapping:
The following mappings are typically used for provisioning:
telephoneNumber → mobile
cn → login
givenName → firstName
mail → email
sn → lastName
cn → firstName
Adding New Attributes:
Click 'Add new'.
Enter the attribute name and description, then click Save.

Toggle the Active switch to enable the new attribute.

Step 3: Map Your LDAP to Cymmetri
In the same window, go to the Policy Map option.
Map each LDAP attribute to its corresponding Cymmetri user attribute. By default, the mapping is set to false and needs to be manually configured.

Step 4: Configure User Configuration
This section defines how Cymmetri searches for and interacts with user entries in LDAP.
Navigate to User Configuration.
Enter the Root Suffixes.

Provide the Principal Password.

Enter the Base Contexts for group entry searches.

Enter the Server HostName.

Enter the Principal (the Bind DN)

Enter the User Entry Searches.

Click Save Configuration and then Test Configuration to verify a successful connection.

Step 5: Configure Server Configuration
This section defines the connection parameters for the connector server.
Enter the Server Hostname.

Enter the Server Password.

Enter the Server Port.

Enter the Server Connector Bundle Name.

Enter the Server Connector Bundle Version.

Enter the Server Connector name.

Click Save Configuration and then Test Configuration.

Step 6: Execute Push Reconciliation on LDAP
Click on Reconciliation, select push, and click on add new

Configure Push Recon Configuration

Click On Run Recon and View in History


Click on the View Icon to see the Progress and the result of reconciliation

View in Reconciliation History

Step 7: View Reconciliation Push User in the LDAP Target System
Go to http://10.0.6.17/phpldapadmin and enter the required credentials.

Select the required server

Click on search and verify in the search filter by entering its value


Last updated
Was this helpful?
