Authenticate with local LDAP
Last updated
Was this helpful?
Last updated
Was this helpful?
In this article, we will expose solutions to benefit from your local LDAP authentication on your GLPI Network Cloud instance.
To benefit from your local LDAP directory, it is necessary to make it accessible from Internet.
That passes by the installation, on your infrastructure, of protocol LDAPS what will allow your directory LDAP and your instance GLPI Network Cloud to communicate in a protected way.
According to your infrastructure, it is also interesting to set up filtering to guarantee that only your instance GLPI Network Cloud can attack your LDAP directory from outside. ( IP address of your instance here )
You must prepare your environment for the use of the LDAPS protocol;
LDAPS protocol enabled/accepted (depending on your environment);
Port 636 open/accepted on your network from Internet/your GLPI Network Cloud instance.
You can finally configure the LDAP(S) authentication in your GLPI Network Cloud instance.
This adds an intermediary and requires more configuration but allows you to benefit from your local directory if you do not want to expose it directly.
Subscribe to Azure AD
Synchronize your local directory with Azure AD;
Choose an authentication method for your GLPI Network Cloud instance (LDAPS or Oauth SSO -> ).
Subscribing to a GLPI Network Cloud Private offer will allow you to call upon our team to set up a dedicated VPN between your GLPI Network Cloud instance and your infrastructure.
Subscribe to a GLPI Network Cloud Private offer;
Migration or deployment of your private instance;
Ask for the implementation of a dedicated VPN;
Planning / Implementation / Validation of the VPN with a technician of our team.