Skip to content

Active Directory / LDAP Enterprise Connection

Active Directory / LDAP connections authenticate users directly against your directory. Unlike SAML, there is no browser redirect to an external IdP; AuthAction binds to LDAP and validates credentials.

  • Network path from AuthAction to your LDAP server (firewall rules for LDAP/LDAPS).
  • A service account with permission to search the user subtree you care about.
FieldDescriptionExample
LDAP Server URLHost and scheme; prefer ldaps:// in productionldaps://ad.example.com:636
Base DNSearch root for usersdc=example,dc=com
Bind DNDN of the service accountcn=authaction-ldap,ou=service,dc=example,dc=com
Bind PasswordService account password (stored encrypted at rest in AuthAction)
Search filterLDAP filter; {{username}} is replaced at login. Default is often (sAMAccountName={{username}})(mail={{username}})
  1. Create a dedicated service account with read access to user objects under your Base DN.
  2. Confirm LDAPS (port 636) or LDAP (port 389) is reachable from AuthAction’s environment according to your security policy.
  1. Open Connections > Enterprise Connections.
  2. Select Active Directory / LDAP.
  3. Enter LDAP Server URL, Base DN, Bind DN, and Bind Password.
  4. Adjust the search filter if users log in with email instead of sAMAccountName.
  5. Save.
  1. Enable the LDAP enterprise connection for the relevant applications.
  2. Sign in using a directory username (or email, depending on your filter) and password.