LDAP and LDAPS

LDAP and LDAPS Directories

On premise Active Directories utilizing LDAP or LDAPS are a common feature in large organizations. Guardrails supports the use of LDAP and LDAPS to sync groups to Guardrails profiles. Note that LDAP and LDAPS CANNOT be used as an authentication method - it is to map Active Directory groups to Guardrails profiles.

Prerequisites

This guide will assume that a Windows Server Domain Controller with AD named example-controller for a domain named internal.company.com. Be sure to use the real values when setting up the directory.

We will also assume that:

Configure the LDAP/LDAPS directory

  1. Log into the Guardrails console with Turbot/Owner permissions at the root (Turbot) level.
  2. Click the Permissions tab (designated with a user icon).
  3. Click the Directories button next to the search bar, then click New Directory, then LDAP.
  4. Enter a title to easily identify the directory, such as Turbot Guardrails AD.
  5. If desired, enter a description for the directory.
  6. Enter the LDAP or LDAPS URL into the URL field. For this example, it would be ldap://example-controller.internal.company.com/DC=internal,DC=company,DC=com.
  1. Set the Distinguished Name to CN=TURBOTADMIN,OU=TURBOTADMINGROUP,DC=internal,DC=company,DC=com. This user, TURBOTADMIN, must have read access to all users.
  2. Enter the password secret.
  3. The BASE section is the LDAP base for all Guardrails user queries. For our example, enter CN=TURBOTUSERGROUP,DC=internal,DC=company,DC=com.
  4. The Profile ID Template is used to generate the ID of the profile for users authenticated via this directory. The value must be unique for each profile in Guardrails. The default {{profile.$source.mail}} generally will produce unique profile IDs.
  5. The Group Profile ID Template, similar to the above user profile template, generates the URN of the profile for groups retrieved via this directory. The profile MUST be unique for each group profile in Guardrails. The default {{groupProfile.#source.cn}} will often be sufficient.

The above steps are necessary to connect via LDAP/ LDAPS, but often organizations have custom configurations beyond what has already been done.

TLS Settings

If the organization uses TLS, configure that in this section.

User Filters

Group Filters

Attribute Map

The Attribute Map section allows AD administrators to define values such as the User Email Attribute, User Family Name Attribute, and Group Membership Attribute.

Create, Test, and Active the Directory

After all the settings have been verified, click Create.

Guardrails includes a control called Turbot > IAM > LDAP Directory > Connectivity Test. This control will run immediately following creation of the directory to test the connection between Guardrails and the AD server. Verify that this control goes into the OK state prior to activating the directory. If this control does not go into the OK state, verify all settings are correct, along with any relevant networking resources.

Once the connectivity test clears, click the Activate Directory button on the directory page to enable the directory for group sync.