To authenticate a user against an LDAP source, we first connect to the LDAP server using the provided bind account. A search is then performed to find an entry with the entered username in the specified search field. If an entry is found, we then take the details returned and attempt to reconnect to the server with that account using the entered password. If this is accepted, the entered credentials are valid.
Requirements From Organization
1.LDAP server name and port (we support normal LDAP over port 389 and LDAP over SSL on port 636)
3.Attribute to search for entered username (mail, sAMAccountName, etc.)
4.A bind account to be able to execute the above search
5.The user’s name (at least one of sn+givenname, displayname, cn, or name attributes) and e-mail address (mail attribute) should be available after binding as the user.Server address ranges will be provided if necessary for firewall configuration.
- AD domain (if using Active Directory)
- Server address ranges will be provided if necessary for firewall configuration.
With LDAP, users will select the Login link on the calendar homepage and sign in directly in the login modal. If other login options are available then they will be listed below (see Login with Facebook below). Note: It is not possible to use LDAP + Localist account logins.