LDAP
The LDAP (Lightweight Directory Access Protocol) connector in the Netmera platform is a critical component for corporate security, enabling the use of external directory services for administrative user authentication.
Overview
Connector Name
LDAP (Lightweight Directory Access Protocol)
Category
Authentication & Directory Service
Provider
Generic LDAP servers (e.g., Microsoft Active Directory, OpenLDAP)
Primary Function
Admin user authentication and directory service querying for Netmera's Control Panel (GUI) login.
Netmera Component
LdapInternalUserAdapter, LdapAwareDaoAuthenticationProvider
Data Flow
Inbound (LDAP Server > Netmera for verification)
The LDAP integration is crucial for organizations that mandate centralized identity management for their internal tools, ensuring Netmera Control Panel access adheres to corporate security policies.
Use Cases and Benefits
Admin User Authentication: The primary use case is to authenticate admin users when they log into the Netmera Control Panel. If the LDAP connector is active, Netmera delegates the authentication check (username and password validation) to the connected LDAP server.
Centralized Identity Management: By integrating with corporate directories (like Active Directory), Netmera eliminates the need to manage separate passwords for admin users, simplifying IT management and enforcing single sign-on (SSO) principles for Netmera access.
User Search and Verification: The integration supports user searching within the directory based on configured parameters (
searchBase,searchField) to retrieve the user's Distinguished Name (DN) before the bind and authentication attempt.Compliance and Security: It helps maintain security compliance by tying Netmera's access controls directly to the organization's existing directory security policies. Netmera internally tracks users verified this way using an ldapUser flag.
Data Flow
The data flow is transactional and Inbound regarding credential verification:
Login Attempt: A Netmera admin user enters their username and password on the Netmera login page.
User Search (Outbound Lookup): Netmera uses the configured
Bind DNand password (Service Account) to connect to the LDAP server and search for the user's full Distinguished Name (DN) based on the provided username and the defined searchBase and searchField.Authentication Bind (Outbound Verification): Netmera attempts a new connection (Bind) to the LDAP server, this time using the retrieved User's DN and the password provided by the user.
Verification (Inbound Result):
If the bind operation succeeds, the LDAP server confirms the credentials are valid, and Netmera grants access (Inbound verification).
If the bind fails, Netmera denies access.
Configuration Reference
The LDAP configuration requires highly specific network and directory parameters, often necessitating close cooperation with the client's corporate IT team.

Setup Instructions
Prerequisites: Establish a dedicated service account (
Bind DN) in the corporate directory with read access to the organizational unit (searchBase) containing the admin user accounts.Obtain Credentials: Secure the LDAP server
Host,Port,Bind DN,Bind Password, and the necessary directory structure parameters (searchBase,searchField,resultField).Configure in Netmera: Navigate to the Netmera Control Panel, select the LDAP connector configuration.
Input Configuration: Enter all collected directory and credential details into the form. Ensure useSsl is set to true if port 636 (LDAPS) is used.
Verification: Test the configuration using a valid LDAP admin username and password. Upon successful saving, the connector handles GUI logins automatically.
Usage Notes & Considerations
Network Accessibility: The Netmera application server must have network access to the configured LDAP host and port. Network configuration issues (firewalls, routing, DNS) are common causes of failure.
Fixed Password Expiration: Netmera enforces a fixed 90-day password expiration policy for all users identified as LDAP users, regardless of the policy set on the actual LDAP server. This is a system-level constraint in Netmera's authentication module.
Authentication Scope Only: This connector is used only for Netmera Control Panel user authentication. It does not automatically synchronize end-user profile data (used for messaging/targeting) or handle transactional customer identities via REST/SDK APIs.
SSL/Certificate Issues: If LDAPS (
useSsl = true) is employed, certificate verification issues can arise if the LDAP server's certificate is not properly trusted by the Netmera infrastructure. The configuration includes a skipCertificateVerification flag to temporarily bypass this, though its use poses a security risk.
Last updated
Was this helpful?