{"id":259,"date":"2015-04-09T19:11:11","date_gmt":"2015-04-09T19:11:11","guid":{"rendered":"https:\/\/www.jumpcloud.com\/engineering-blog\/?p=259"},"modified":"2023-06-14T13:49:56","modified_gmt":"2023-06-14T17:49:56","slug":"how-to-connect-your-application-to-ldap","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/how-to-connect-your-application-to-ldap","title":{"rendered":"How to Connect Your Application to LDAP"},"content":{"rendered":"\n

JumpCloud\u2019s Directory-as-a-Service solution is based in large part on LDAP<\/a>. A core part of the solution is to enable devices and applications to authenticate via LDAP. The way our solution works is that admins place their users in the JumpCloud directory. Our directory enables those credentials that have been created in the JumpCloud directory to be leveraged via a number of different protocols such LDAP, SAML, SSH, and others. The goal of Directory-as-a-Service is to enable a wide variety of devices and applications to be authenticated and authorized.<\/p>\n\n\n\n

For this particular blog post, we\u2019ll focus on the ability for applications to authenticate to our LDAP server<\/a>. The process generally works as follows:<\/p>\n\n\n\n

    \n
  1. Users are created within JumpCloud<\/li>\n\n\n\n
  2. To authenticate\/authorize via LDAP, you enable the LDAP setting in JumpCloud<\/li>\n\n\n\n
  3. You configure your application to connect and authenticate\/authorize to the JumpCloud LDAP server<\/li>\n\n\n\n
  4. An end user types in their credentials in the application<\/li>\n\n\n\n
  5. The application authenticates and authorizes to JumpCloud\u2019s LDAP endpoint<\/li>\n\n\n\n
  6. The user is granted the proper permissions<\/li>\n<\/ol>\n\n\n\n

    The core of this process is how to configure your application to communicate with JumpCloud. This can be a tricky configuration setup if you don\u2019t know the various parameters to pass to LDAP. We\u2019ll review some of those parameters here, but, of course, if you need help connecting your application to JumpCloud, just drop us a note \u2013 we\u2019d be happy to help.<\/p>\n\n\n\n

    We\u2019ve already blogged about connecting a number of common applications to JumpCloud. These include: Git LDAP authentication<\/a>, Okta, OpenVPN, Meraki, Jira, Confluence, and MySQL LDAP<\/a> configurations among others. These are good examples and will provide you with a variety of different approaches to connecting your application to LDAP.<\/p>\n\n\n\n

    For your specific application, we\u2019ll go over some of the key parameters to consider:<\/p>\n\n\n\n