Skip to main content

Capabilities

ResourceSyncProvision
Accounts
Roles (organizationalRole in LDAP)
Groups (groupOfUniqueNames in LDAP)
The LDAP connector supports automatic account provisioning and deprovisioning.

POSIX account provisioning

The LDAP connector supports provisioning posixAccount entries with automatic UID number assignment. When creating a new POSIX account, the connector can look up the highest uidNumber currently in use across all existing posixAccount entries in your directory and automatically assign the next available value. To use this feature, configure the following account provisioning mappings:
Mapping fieldDestination valueDescriptionExample CEL expression
RDN KeyrdnKeyThe RDN attribute for the new entry"uid"
RDN ValuerdnValueThe value for the RDN attributesubject.profile.login
PathpathThe DN path where the account will be created"ou=users,o=Example Org"
SuffixsuffixThe top-level entry DN (naming context)"dc=example,dc=com"
Object Class(es)objectClassMust include posixAccount["top", "person", "organizationalPerson", "posixAccount"]
Calculate the next valid UID NumbercalculatePosixUIDNumberSet to true to enable automatic UID assignmenttrue
Additional AttributesadditionalAttributesOther required POSIX attributes{"cn": "Jane Doe", "sn": "Doe", "homeDirectory": "/home/jdoe", "gidNumber": "5000"}
Automatic UID number calculation assigns uidNumber only. You must provide gidNumber manually in the Additional Attributes mapping. If you set Calculate the next valid UID Number to true, any uidNumber value provided in Additional Attributes is ignored.

Gather LDAP credentials

Configuring the connector requires you to pass in credentials for LDAP. Gather these credentials before you move on. Here’s the set of credentials you’ll need when setting up the connector:
  • The username and password of an LDAP account
  • URL of the LDAP server, which can use either ldap: or ldaps: schemes, and optionally includes a port number
That’s it! Next, move on to the connector configuration instructions.

Configure the LDAP connector

To complete this task, you’ll need:
  • The Connector Administrator or Super Administrator role in ConductorOne
  • Access to the set of LDAP credentials generated by following the instructions above
Follow these instructions to use a built-in, no-code connector hosted by ConductorOne.Cloud-hosted connector not currently available.