- Samba
- Active Directory
- OpenLDAP
- NetIQ eDirectory
For NetIQ, replace all the ldap
prefix in the configuration by netiq
.
Name | Supported? |
---|---|
Authentication | Yes |
Directory | Yes |
Identity | Yes |
Profile | Yes |
To use your LDAP backend, add the bare minimum configuration in mxisd config file:
ldap.enabled: true
ldap.connection.host: 'ldapHostnameOrIp'
ldap.connection.port: 389
ldap.connection.bindDn: 'CN=My Mxisd User,OU=Users,DC=example,DC=org'
ldap.connection.bindPassword: 'TheUserPassword'
ldap.connection.baseDNs:
- 'OU=Users,DC=example,DC=org'
These are standard LDAP connection configuration. mxisd will try to connect on port default port 389 without encryption.
If you would like to use several Base DNs, simply add more entries under baseDNs
.
If you would like to use a TLS/SSL connection, use the following configuration options (STARTLS not supported):
ldap.connection.tls: true
ldap.connection.port: 12345
You can also set a default global filter on any LDAP queries:
ldap.filter: '(memberOf=CN=My Matrix Users,OU=Groups,DC=example,DC=org)'
This example would only return users part of the group called My Matrix Users
.
This can be overwritten or append in each specific flow describe below.
For supported syntax, see the LDAP library documentation.
LDAP features are based on mapping LDAP attributes to Matrix concepts, like a Matrix ID, its localpart, the user display name, their email(s) and/or phone number(s).
Default attributes are well suited for Active Directory/Samba. In case you are using a native LDAP backend, you will most certainly configure those mappings.
ldap.attribute.uid.type
: How to process the User ID (UID) attribute:
ldap.attribute.uid.value
: Attribute to use to set the User ID value.
The following example would set the sAMAccountName
attribute as a Matrix User ID localpart:
ldap.attribute.uid.type: 'uid'
ldap.attribute.uid.value: 'sAMAccountName'
Use ldap.attribute.name
.
The following example would set the display name to the value of the cn
attribute:
ldap.attribute.name: 'cn'
You can also change the attribute lists for 3PID, like email or phone numbers.
The following example would overwrite the default list of attributes for emails and phone number:
ldap.attribute.threepid.email:
- 'mail'
- 'otherMailAttribute'
ldap.attribute.threepid.msisdn:
- 'phone'
- 'otherPhoneAttribute'
Identity features (related to 3PID invites or searches) are enabled and configured using default values and no specific configuration item is needed to get started.
ldap.identity.filter
: Specific user filter applied during identity search. Global filter is used if blank/not set.ldap.identity.medium
: Namespace to overwrite generated queries from the list of attributes for each 3PID medium.
No further configuration is needed to use the Authentication feature with LDAP once globally enabled and configured.
Profile auto-fill is enabled by default. It will use the ldap.attribute.name
and ldap.attribute.threepid
configuration
options to get a lit of attributes to be used to build the user profile to pass on to synapse during authentication.
ldap.auth.filter
: Specific user filter applied during identity search. Global filter is used if blank/not set.
No further configuration is needed to use the Directory feature with LDAP once globally enabled and configured.
To set a specific filter applied during directory search, use ldap.directory.filter
If you would like to use extra attributes in search that are not 3PIDs, like nicknames, group names, employee number:
ldap.directory.attribute.other:
- 'myNicknameAttribute'
- 'memberOf'
- 'employeeNumberAttribute'