Lightweight Directory Access Protocol (LDAP)
Lightweight Directory Access Protocol (LDAP) is a vendor-neutral software protocol used to lookup information or devices within a network. Bytebase supports using LDAP for configuring Single Sign-On (SSO).
Configuration
Basic information:
- Name: the display name shown to your users (e.g. JumpCloud)
- Identity Provider ID: a human-readable unique string, only lower-case alphabets and hyphens are allowed (e.g. jumpcloud)
- Domain: the domain name to scope associated users (e.g. jumpcloud.com, optional)
Identity provider information:
- Host: the host of LDAP server (e.g. ldap.jumpcloud.com)
- Port: the port number of the LDAP server, usually 389 for StartTLS and 636 for LDAPS
- Bind DN: the Distinguished Name (DN) of the user to bind as a service account to perform search requests (e.g. uid=system,ou=Users,dc=jumpcloud,dc=com)
- Bind Password: the password of the user to bind as a service account
- Base DN: the base Distinguished Name (DN) to search for users (e.g. ou=users,dc=jumpcloud,dc=com)
- User Filter: the filter to search for users (e.g. (uid=%s), where%swill be subsituted by the username)
- Security protocol: the security protocol to be used for establishing connections with the LDAP server
User information field mapping:
- Email: the attribute to be used as the Bytebase user email address (e.g. mail)
- Display name: the attribute to be used as the Bytebase user display name (e.g. displayName, optional)
- Phone: the attribute to be used as the Bytebase user phone number (e.g. phone, optional)
JumpCloud
info
- The attribute uidis the username (e.g.system) not the email (e.g.system@example.com) in JumpCloud.
- Follow the JumpCloud Use Cloud LDAP to create an LDAP binding user and add Users to the LDAP directory.
- In Bytebase, go to Settings > SSO to create a new LDAP provider (all values are examples):
- Name: JumpCloud
- Identity Provider ID: jumpcloud
- Domain: jumpcloud.com
- Host: ldap.jumpcloud.com
- Port: 389
- Bind DN: uid=YOUR_USERNAME,ou=Users,o=YOUR_ORG_DN,dc=jumpcloud,dc=com
- Bind Password: YOUR_PASSWORD
- Base DN: ou=Users,o=YOUR_ORG_NAME,dc=jumpcloud,dc=com
- User Filter: (&(objectClass=posixAccount)(uid=%s))
- Security protocol StartTLS
- Email: mail
- Display name: displayName
 
- Name: 
Okta
info
The attribute uid is the username (e.g. system) not the email (e.g. system@example.com) in Okta.
- Follow the Okta Enable the LDAP interface to enable LDAP interface for your directory.
- In Bytebase, go to Settings > SSO to create a new LDAP provider (all values are examples):
- Name: Okta
- Identity Provider ID: okta
- Domain: okta.com
- Host: YOUR_SUBDOMAIN.ldap.okta.com
- Port: 389
- Bind DN: uid=YOUR_USERNAME,ou=users,dc=YOUR_SUBDOMAIN,dc=okta,dc=com
- Bind Password: YOUR_PASSWORD
- Base DN: ou=users,dc=YOUR_SUBDOMAIN,dc=okta,dc=com
- User Filter: (&(objectClass=inetOrgPerson)(uid=%s))
- Security protocol StartTLS
- Email: mail
- Display name: cn
 
- Name: 
