All Products
Search
Document Center

Secure Access Service Edge:Connect to an LDAP identity source

Last Updated:Mar 31, 2026

SASE enforces identity-driven security policies. If your organization manages its directory structure with a Lightweight Directory Access Protocol (LDAP) server — Windows Active Directory (AD) or OpenLDAP — connect it to SASE so employees can log on to the SASE app using their existing corporate accounts.

Limits

  • Maximum five identity sources can be enabled simultaneously.

  • Only one custom identity source can be enabled at a time.

To enable a new identity source when the quota is full, disable an existing one first.

Important

Disabling an identity source prevents end users from using the SASE app to access internal applications. Proceed with caution.

Prerequisites

Before you begin, ensure that you have:

  • Access to the SASE console

  • Your LDAP or AD server address and port number

  • Administrator DN and password for the directory

  • (Optional) A SASE connector configured, if your LDAP server is on an internal network

Connect an LDAP identity source

Step 1: Start the configuration wizard

  1. Log on to the SASE console.

  2. In the left navigation pane, choose Identity Authentication > Identity Access.

  3. On the Identity synchronization tab, click Create IdP.

  4. In the Create IdP panel, select LDAP, then click Configure.

Step 2: Basic configurations

Configure the following parameters, then click Next.

ParameterDescription
IdP NameA name for the identity source. Must be 2–100 characters. Accepts Chinese characters, letters, digits, hyphens (-), and underscores (_).
DescriptionDisplayed as the logon title in the SASE client. Helps users identify the identity source at logon.
IdP StatusEnabled activates the identity source immediately after creation. Closed creates it in a disabled state.
TypeSelect Windows AD for Microsoft Active Directory, or OpenLDAP for open-source LDAP.
Server addressThe address of your AD or LDAP server. You can add up to five server addresses.
Server port numberThe port your AD or LDAP server listens on.
Access authentication server from connectorIf the LDAP server is on an internal network, select a connected connector instance to route access.
SSL connectionSet to Yes to encrypt data in transit between SASE and the LDAP server.
Base DNThe base distinguished name (DN) that scopes user authentication. SASE authenticates all accounts under this node. Must be 2–100 characters.
Organizational structure synchronizationEnter the administrator DN and password to pull the directory structure from the identity source. This enables batch policy assignment by org unit. SASE does not read individual employee data during policy issuance.
Logon username attributeMaps an LDAP attribute to the username employees enter at logon. See the table below.

Logon username attribute — choose by scenario:

LDAP attributeDescription
sAMAccountNameA default LDAP attribute for the username.
userPrincipalNameIncludes a domain suffix. Employees must enter the full UPN including the domain suffix at logon (for example, user@corp.example.com).
cnA default LDAP attribute for the username.
givenNameA default LDAP attribute for the username.
displayNameA default LDAP attribute for the username.
nameA default LDAP attribute for the username.
Custom attributeAny other LDAP-defined attribute in your schema.
If you select userPrincipalName, employees must enter the full UPN including the domain suffix (for example, user@corp.example.com) when logging on.
If users and groups are not under the same node in your LDAP tree, configure User Base DN and Group Base DN separately under Advanced Settings instead of using the common Base DN field.

Continue configuring the remaining parameters:

ParameterDescription
Group name attributeMaps an LDAP attribute to group names. Common options: cn, name, sAMAccountName.
Group mapping attributeDefines group membership relationships. Default: memberOf. If configured, the value must match what is set in your LDAP schema.
Group filterAn LDAP filter expression to scope which groups are synchronized. Common examples: (&(objectClass=organizationalUnit)(objectClass=organization)) matches groups of both types; `((objectClass=organizationalUnit)(objectClass=organization)) matches groups of either type; (!(objectClass=organizationalUnit))` excludes a specific type. For filter syntax, see LDAP Filters.
User filterAn LDAP filter expression to scope which users are synchronized. Examples: (&(objectClass=person)(objectClass=user)) matches users of both types; `((objectClass=person)(objectClass=user)) matches users of either type; (!(objectClass=person))` excludes a specific type.
Automatic synchronizationEnables periodic sync from LDAP. If disabled, you must trigger synchronization manually.
Synchronize user informationWhen enabled, syncs employee data on the automatic synchronization schedule. Requires Automatic synchronization to be enabled.
Automatic synchronization cycleThe interval between automatic syncs. Set a value from 1 hour to 24 hours.

Step 3: Synchronization settings

Configure the synchronization scope and map LDAP fields to SASE fields, then click Next.

ParameterDescription
Organizational structure synchronizationSynchronize All imports the entire LDAP directory structure. Partially Synchronize lets you select specific organizational units.
Field synchronization mappingMaps LDAP fields to SASE fields. To add custom fields beyond the built-in ones, click View Extended Fields in the upper-right corner.

Step 4: Logon settings

Configure how employees authenticate on each device type.

PC logon

OptionDetails
Logon with account and passwordStandard username/password logon. Supports two-factor authentication (2FA).
Password-free logonEmployees scan a QR code using the SASE mobile app. No password required.

Two-factor authentication for PC (when using account and password):

MethodHow it works
OTP-based authenticationRequires a one-time password (OTP) token. Select one of three modes: (1) SASE mobile client generates the token — requires the SASE mobile app; (2) third-party OTP app — clock must be synchronized; (3) company-owned OTP — contact technical support to configure.
Verification code-based authenticationSends a verification code via SMS or email. Each user must have a mobile number or email address configured in the identity source.

Mobile device logon

OptionDetails
Logon with account and passwordStandard username/password logon. Supports two-factor authentication.
Fingerprint or face recognitionBiometric authentication. On first logon, employees must enter a username and password to register.

Two-factor authentication for mobile (when using account and password):

MethodPrerequisite
OTP-based authenticationPC OTP must be enabled first with Allow tokens on third-party applications or Allow enterprise-owned tokens selected. Mobile OTP configuration follows the same settings.
Verification code-based authenticationEach user must have an email address configured in the identity source.

Step 5: Test and confirm

After completing all configuration steps, click Logon Test at the bottom of the panel to verify connectivity.

image
If the test returns Failed To Connect To The LDAP Server. Contact The Administrator., check that the server address and port are correct and that the server is reachable from the SASE network.

When the test succeeds, click OK to save the configuration.

View synchronization records

  1. On the Identity synchronization tab, find the identity source and click Synchronize Records in the Actions column.

  2. On the Synchronize Records page, click a sync task in the Synchronization Task panel on the left to see its details on the right.

image
  1. Click Details in the Actions column for a specific task to compare the Third-party data source fields against the SASE data source fields.

Trigger a manual sync

If automatic synchronization is disabled, or if your directory structure has changed, trigger a sync manually: click Create Synchronization Task, then click OK. Wait for the task to complete before reviewing the results.

After a successful sync, view the updated organizational structure and employee list under Identity Authentication > Identity Access > Employee Center. For details, see Employee Center.

More operations

TaskHow
Disable automatic synchronizationOn the Identity synchronization page, turn off the switch in the Automatic Synchronization column. Alternatively, turn off the switch in the Edit IdP panel.
Edit the identity sourceOn the Identity synchronization page, click Edit in the Actions column.
Disable the identity sourceOn the Identity synchronization tab, turn off the switch in the IdP Status column.
Delete the identity sourceOn the Identity synchronization page, click Delete in the Actions column.

What's next

References