Setting up LDAPS Google 🆕
This procedure guides you step-by-step through configuring LDAPS with Google and connecting it to GLPI.
LDAPS with Google requires a specific license. Please refer to Google Support to verify if your license is sufficient.
4 steps are necessary to correctly configure your LDAPS.
Add a new LDAP client
Configure access permissions
Create a certificate
Connect your LDAP client to GLPI
Add a new LDAP client
Application Creation

From the Admin Console, navigate to Apps > LDAP
Click Add Client
Name the client and add a description if needed
Click Continue
Configure Access Permissions
You must then set the level of access this LDAP client will have.

Verify user credentials
When a user tries to sign in to the application, this setting specifies which organisational units and groups the LDAP client can access to verify the user’s credentials. Users who aren’t in a selected organisational unit and groups can’t sign in to the application.
Read user information
This setting specifies which organisational units the LDAP client can access to retrieve additional user information.
You can also select the attributes that can be read by the LDAP client:
System attributes
Custom public attributes
Custom private attributes
Click View attributes to check each category of each attribute.
Read group information
This setting specifies whether the LDAP client can check a user’s group memberships for purposes, such as a user’s role in the application.
Once all these options are configured, click Add LDAP Client.
Create a Certificate
The certificate is logically generated upon application creation. If not, click on your application and go to the Authentication section.

Then click Generate new certificate.
Download the certificate and its key, transfer it to the GLPI server, and unzip it into the desired folder.

Connect Your LDAP Client to GLPI

From Setup> Authentication > LDAP Directory, click
+ AddEnter the information related to your LDAPS:
Server:
ldaps://ldap.google.comPort:
636BaseDN: Enter your domain (e.g.,
dc=my_domain,dc=com)
Click
+ AddFrom the Advanced Information tab, enter the path to the certificate and its key in the corresponding fields (refer to the previous step if needed).

Test LDAPS
Go to the Test tab to verify that your LDAPS is functioning correctly.

You can now go to Administration > Users > LDAP Directory Link and import your users and groups.

Last updated