Skip to main content

LDAP Configuration

LDAP Configuration Overview

If your organization already manages users in LDAP or Active Directory, you can connect IOMETE to that directory to import users and groups and let LDAP users sign in with their existing credentials.

Open Settings → IAM → LDAP to configure the integration. Only users with the IAM Manager admin role can access this page.

info

Each IOMETE installation supports a single, platform-wide LDAP configuration. The configuration is shared across all workspaces and clusters in the installation.

Configuration

General Options

The General Options section includes the following settings:

  • Connection URL: The URL to connect to your LDAP server. Example: ldap://openldap.infra.svc:389
  • Bind DN: The distinguished name (DN) used for binding to the LDAP server. This bind DN must have the necessary permissions on the LDAP directory. Example: cn=admin,dc=iomete,dc=com
  • Bind credential: The password for the bind DN.
LDAP general options with Connection URL, Bind DN, and Bind credential fields | IOMETELDAP general options with Connection URL, Bind DN, and Bind credential fields | IOMETE

Use Test connection after entering the Connection URL to verify that IOMETE can reach the LDAP server.

Use Test authentication after entering the Connection URL, Bind DN, and Bind credential to verify that the bind credentials work.

User Searching and Updating

Defines the LDAP query parameters for locating and filtering users in the directory.

  • Users DN: The full DN where the users are located in the LDAP directory. This DN is the parent of LDAP users. Example: ou=users,dc=iomete,dc=com.
  • User object classes: A comma-separated list of object classes that identify LDAP user objects. Example: inetOrgPerson, organizationalPerson.
  • Custom user LDAP filter (Optional): Add a custom filter to refine user search. Enter one LDAP filter per line in the editor.
LDAP configuration User Search section with Users DN, User object classes, and Custom user LDAP filter | IOMETELDAP configuration User Search section with Users DN, User object classes, and Custom user LDAP filter | IOMETE

Use Validate user filters to check each non-empty filter line before saving. See Validating LDAP Filters for details.

User Attribute Mappings

Map each IOMETE user attribute to the corresponding LDAP attribute so that user information is correctly retrieved from the directory.

  • username: LDAP attribute mapped as the IOMETE username. Commonly uid for many LDAP servers, and sAMAccountName or cn for Active Directory.
  • email: LDAP attribute mapped as the IOMETE email. Typically mail for most LDAP servers.
  • firstName: LDAP attribute mapped as the IOMETE first name. Default cn (common name).
  • lastName: LDAP attribute mapped as the IOMETE last name. Commonly sn (surname).
LDAP user attribute mappings with username, email, firstName, and lastName fields | IOMETELDAP user attribute mappings with username, email, firstName, and lastName fields | IOMETE

To mark some imported users as service accounts based on an LDAP attribute, enable Use service-account. Three columns appear:

  • User attribute: Always userType (read-only). This is the IOMETE-side identifier.
  • LDAP attribute: The LDAP attribute that IOMETE inspects on each user. Example: employeeType.
  • Attribute value: The value that marks the user as a service account. Example: Service.

Imported users whose LDAP attribute equals this value are created as service accounts instead of person accounts. You can manage their API access with service account access tokens.

LDAP user attribute mappings with Use service-account enabled and the userType, LDAP attribute, and Attribute value columns | IOMETELDAP user attribute mappings with Use service-account enabled and the userType, LDAP attribute, and Attribute value columns | IOMETE

Defines how LDAP groups are searched and mapped, including the DN base, object classes, filter, and group attribute mappings. This section is optional.

Select Group searching and updating to enable group sync. When the checkbox is unchecked, the rest of the group fields are hidden and IOMETE only syncs users.

  • Groups DN: Defines the LDAP tree where groups are located. Example: ou=groups,dc=iomete,dc=com.
  • Group object classes: A comma-separated list of object classes that identify LDAP group objects. Example: groupOfNames.
  • Custom group LDAP filter (Optional): Add a custom filter to refine group searches. Enter one LDAP filter per line in the editor.
LDAP Group Search section with Group searching and updating enabled, Groups DN, Group object classes, and Custom group LDAP filter | IOMETELDAP Group Search section with Group searching and updating enabled, Groups DN, Group object classes, and Custom group LDAP filter | IOMETE

Use Validate group filters to check group filter lines before saving.

Group Attribute Mappings

Fill these attributes for the LDAP group records you want to import from the directory.

  • name: The LDAP attribute used for group names and RDN is typically cn. For example, a group's DN might look like cn=Group1,ou=groups,dc=example,dc=org.
  • membership: The LDAP attribute used for group membership mapping is typically member.
  • membershipAttributeType: Specifies the type of the membership attribute. Choose DN or UID. DN represents the full path to the user in the directory, while UID refers to the user's unique identifier.
LDAP group attribute mappings with name, membership, and membershipAttributeType fields | IOMETELDAP group attribute mappings with name, membership, and membershipAttributeType fields | IOMETE

Sync Settings

Use Periodic full sync to control whether IOMETE regularly synchronizes LDAP users and groups. When enabled, enter the full sync period in seconds. The minimum is 5 seconds, and the default is 86400 seconds (24 hours).

LDAP sync settings with Periodic full sync enabled and a 86400 second interval | IOMETELDAP sync settings with Periodic full sync enabled and a 86400 second interval | IOMETE

After filling in all required information, click Save.

Validating LDAP Filters

You can validate custom user and group filters before you save the configuration.

Validated custom user LDAP filter showing 12 valid lines and 1 warning for a filter line with no results | IOMETEValidated custom user LDAP filter showing 12 valid lines and 1 warning for a filter line with no results | IOMETE
  • Use Validate user filters or Validate group filters above the relevant filter editor.
  • Enter one LDAP filter per line. Blank lines are ignored.
  • Each validated line shows a status in the editor:
    • Green means the line returned results.
    • Yellow means the line returned no results.
    • Red means the line produced an LDAP error.
  • If the DN format is invalid, IOMETE shows an inline error on the DN field.
  • If the LDAP server can't find the configured object path, IOMETE shows No such object. Check DN and object classes.

LDAP Actions

After saving the integration, you can manage LDAP from the same page.

LDAP action buttons: Sync all users and groups, Disable LDAP, and a menu with Remove all users and groups and Delete LDAP | IOMETELDAP action buttons: Sync all users and groups, Disable LDAP, and a menu with Remove all users and groups and Delete LDAP | IOMETE

Syncing All Users and Groups

Click Sync all users or Sync all users and groups to synchronize the current LDAP users and groups with the IOMETE user and group database.

Removing Imported Users and Groups

Click Remove all users or Remove all users and groups to delete previously imported LDAP data from IOMETE without deleting the LDAP configuration itself.

Enabling or Disabling LDAP

Use Enable LDAP or Disable LDAP to turn the integration on or off. When LDAP is disabled, imported LDAP users can no longer sign in until it is enabled again.

Deleting LDAP

Click Delete LDAP to permanently remove the LDAP configuration and the LDAP users and groups imported through it.

Soft-Delete Behavior

When the identitySoftDelete feature flag is enabled, LDAP sync uses an archive-and-restore flow instead of hard-deleting imported LDAP records.

  • Full sync: Existing LDAP users and groups are updated, previously archived LDAP users and groups are restored, new LDAP users and groups are created, and LDAP users and groups that no longer exist in the directory are archived. Before rebuilding the current LDAP state, IOMETE also soft-deletes LDAP user-group, user-role, group-role, and group-to-group mappings, then recreates the current mappings from the latest sync result.
  • Remove all users or Remove all users and groups: IOMETE soft-deletes all LDAP-origin users, groups, and LDAP mappings, but keeps the LDAP integration settings so you can sync again later.
  • Delete LDAP: IOMETE soft-deletes the LDAP integration record and soft-deletes all LDAP-origin users, groups, and LDAP mappings. After the delete completes, the page returns to create mode.
  • Event logs: Full sync still writes the standard LDAP Sync audit entry. In the soft-delete path, IOMETE also writes iam-users / USERS_SYNCED and iam-groups / GROUPS_SYNCED event-log entries with created, updated, restored, and archived lists.

When the feature flag is disabled, full sync hard-cleans and re-imports LDAP data, and the remove/delete actions hard-delete imported LDAP users, groups, and mappings.

Access Permissions

All operations on the LDAP page require the IAM Manager admin role.

Admin roleViewCreateUpdateEnable/DisableSyncRemove importedDelete
IAM ManagerYesYesYesYesYesYesYes
Any other roleNoNoNoNoNoNoNo

Auditing LDAP

To audit LDAP operations, go to Administration → Event Logs in Admin Portal. Here, you can view who performed LDAP-related actions and when.

LDAP audit logs | IOMETELDAP audit logs | IOMETE

Click the + icon on the left of any entry to inspect the payload for that action.

Expanded LDAP Sync event log entry showing the JSON payload with user and group search parameters and attribute mappings | IOMETEExpanded LDAP Sync event log entry showing the JSON payload with user and group search parameters and attribute mappings | IOMETE