All Products
Search
Document Center

Identity as a Service:Bind IDaaS to OpenLDAP inbound

Last Updated:Mar 31, 2026

Connect your corporate OpenLDAP directory to IDaaS as an inbound identity provider. This lets you import OpenLDAP organizations and accounts into IDaaS, and authenticate users with their existing LDAP credentials.

Supported capabilities

CapabilitySupportedDescription
Sync organizations and accountsYesImport LDAP organizations and user accounts into IDaaS automatically on a daily full-sync schedule.
Delegated authenticationYesVerify user credentials against LDAP so users log on to IDaaS and connected applications with their LDAP credentials.
Automatic password updateYesWhen a user logs on through delegated authentication and the IDaaS account has no password, IDaaS sets it to match the LDAP password.
Custom user filterYesSync only users that match a custom LDAP filter expression.
Sync protectionYesAutomatically cancel a sync job if it would delete more than 30 accounts or 10 organizations, preventing accidental data loss.
Incremental syncNoLDAP does not support incremental queries. IDaaS performs a full sync every morning and supports manual full syncs on demand.

How it works

IDaaS connects to your LDAP server through the configured network endpoint. During synchronization, IDaaS reads the directory tree under the specified source node (Base DN) and imports organizations and user accounts. During authentication, IDaaS binds to LDAP with the user's credentials to verify the password.

Use the Network Access Endpoint feature to sync data and delegate authentication without opening public ports on your LDAP server.

Prerequisites

Before you begin, ensure that you have:

  • An IDaaS instance with administrator access

  • An LDAP administrator account with at least read permissions, in Distinguished Name (DN) format — for example, cn=admin,ou=Technical Department,dc=example,dc=com

  • The LDAP server address and port

Connect IDaaS to OpenLDAP

Step 1: Configure the connection

  1. Log on to the IDaaS console. Find the instance and click Console in the Actions column.IDaaS console

  2. In the left navigation pane, choose IdPs > Inbound. Click Add Outbound. In the provider list, find OpenLDAP and click Add.

    image

  3. On the Connect to OpenLDAP panel, configure the following parameters.

    ParameterDescription
    Display NameThe name shown to users when they log on to IDaaS.
    Network Access EndpointControls how IDaaS reaches your LDAP server. A shared endpoint uses a fixed public outbound IP address. A dedicated endpoint uses a private outbound IP address, letting IDaaS access your Alibaba Cloud VPC over a private network — no public port required. To restrict inbound requests to IDaaS only, configure an IP allowlist on your LDAP server. For details, see Network endpoints.
    Server addressThe address and port of the LDAP server. Default port: 389 — for example, 127.0.0.1:389. If you enable LDAPS or StartTLS, port 636 is typically used.
    Enable StartTLSEncrypts the LDAP connection. Enabling this significantly improves connection security. For certificate setup, see LDAP security configuration.
    Administrator AccountThe LDAP account IDaaS uses to read directory data for sync and delegated authentication. Requires at least read permissions. Must be in DN format — for example, cn=admin,ou=Technical Department,dc=example,dc=com.
    Administrator PasswordThe password for the administrator account.

    image.png

Step 2: Select features

Select which capabilities to enable.

image.png

Basic configuration

  • Synchronization Direction: Sets the LDAP source node from which organizations and accounts are imported into IDaaS. Enter the DN of the source node — for example, dc=example,dc=com for the root node.

  • Scheduled Verification: IDaaS runs a full sync every morning. To sync immediately, trigger a manual full sync. If a single account fails to import, the remaining imports continue. Check Synchronization Logs for failure details. IDaaS includes sync protection: if more than 30 accounts or 10 organizations are scheduled for deletion in a single sync job, the job is automatically canceled. Adjust the protection threshold to match your organization's size.

    image

  • Delegated Authentication: Lets users log on to IDaaS using their LDAP username and password.

  • Automatic Password Update: When a user logs on through delegated authentication and the IDaaS account has no password, IDaaS sets it to match the LDAP password. The LDAP password must meet the IDaaS password policy requirements. Otherwise, the password cannot be updated automatically.

Advanced settings

  • User/Organization ObjectClass: Defines which LDAP objects are treated as users or organizations. For example, an object where ObjectClass=user is treated as a user.

    Important

    If you customize the ObjectClass for users or organizations, keep the value consistent. Inconsistent values cause unexpected sync results.

  • User logon identity: The LDAP attributes IDaaS uses to find a user during delegated authentication. Enter multiple attributes separated by commas to create an OR condition — a user can log on with any of the specified attributes. All attributes must map to the same LDAP user; otherwise, authentication fails.

  • User filter: A custom LDAP filter expression that limits which users are synced. By default, the filter includes an AND condition for ObjectClass. Click View Details to see the full expression. For filter syntax, see LDAP filter syntax.

    image.png

Step 3: Configure field mappings

Map LDAP attributes to IDaaS account fields. This is useful if you have existing IDaaS accounts and want to link them to LDAP users based on a matching field — for example, match on mobile phone number. To use a field as a mapping identifier, enable it manually, as shown in the following figure.

image.png
For details, see Field mappings.

LDAP security configuration

By default, LDAP transmits data in plaintext. Enabling LDAPS or StartTLS encrypts the connection and significantly reduces the risk of data interception.

After you configure a certificate on your LDAP server, click the corresponding button in IDaaS to retrieve the certificate fingerprint. This establishes a trust relationship between IDaaS and the LDAP certificate.

image.png

LDAP custom configuration

ObjectClass

In LDAP, an ObjectClass is a collection of attributes that defines what an object represents — a user, organization, computer, and so on. Every LDAP object must have an ObjectClass. For example, if you set the User ObjectClass to inetOrgPerson,posixAccount,top in IDaaS, any object with those classes is treated as a user. To check the ObjectClass of an object, view it in your LDAP admin tool.

image
Important

If you customize the ObjectClass for users or organizations, keep the value consistent across all objects. Inconsistent values cause unexpected sync results.

Logon identity

When a user logs on to IDaaS through delegated authentication, IDaaS searches LDAP using the configured attributes to find the user and verify the password.

Common attributes include uid, mobile phone number, mailbox, and employee ID. If you configure multiple attributes, they create an OR condition — each attribute must be unique within the directory and map to the same LDAP user. If multiple LDAP users match, authentication fails.

LDAP filter syntax

Important

Changing ObjectClass or filter affects which LDAP entries are synced. During a full sync, IDaaS accounts and organizations that no longer match the filter are deleted. Before making changes, raise the sync protection limit and verify the filter results in a test environment.

Overview

A custom filter limits which users are synced from LDAP to IDaaS. By default, the filter includes an AND condition for ObjectClass. Click View Details to see the full expression.

image.png

To verify filter results before applying them, run the expression in an LDAP admin tool.

image.png

Common syntax

OperatorMeaningExample
=Equal to(cn=Alice)
>=Greater than or equal to(pwdLastSet>=1319563845000000000)
<=Less than or equal to(employeeNumber<=1000)
&AND — all conditions must be met(&(cn=CN*)(title=RD))
|OR — at least one condition must be met(|(cn=Test*)(cn=Admin*))
!NOT — condition must not be met(!(cn=Test*)(cn=Admin*))

Common statements

ScenarioFilter expression
Username starts with "CN"(cn=CN*)
User with a specific mailbox(mail=alice@example.com)

LDAP synchronization configuration

Obtain the Base DN

A Base Distinguished Name (Base DN) identifies the node in the LDAP directory tree under which IDaaS performs queries and sync operations. Set the Base DN in the Synchronization Direction settings.

DN format: ou=some-organization,dc=example,dc=com. The root node DN is typically dc=example,dc=com (your domain). To find the DN of a node, view it in your LDAP admin tool.

image

When you configure the Base DN, IDaaS also records the node's ObjectGuid as a fingerprint. If the node's path changes and the Base DN no longer matches the stored fingerprint, IDaaS blocks sync to prevent data errors. Reconfigure the source node to resume sync.

Scheduled verification

LDAP does not support incremental data queries, so IDaaS performs a full sync every morning. To sync immediately, trigger a manual full sync.

IDaaS includes sync protection: if more than 30 accounts or 10 organizations are scheduled for deletion in a single sync job, the job is automatically canceled. Adjust the protection threshold based on your organization's size.

image.png