Skip to main content
Version: Current

Microsoft Active Directory (LDAP)

Introduction

Use this guide to configure Microsoft Active Directory (AD) or a generic LDAP directory as an authentication provider for the AI Command Center.

You can configure any LDAP-based directory service, such as Microsoft Active Directory, OpenLDAP Directory, Apache Directory Server, or Apple Directory Server. You can set LDAP synchronization to automatically import users and groups from your Active Directory. By default, it assigns the RPA Member and BPA Member roles to newly created LDAP users.

Overview

Using LDAP authentication, you can:

  • Register multiple LDAP providers (Microsoft AD or generic LDAP)
  • Enable/Disable without losing configuration
  • Synchronize users and groups on a schedule

Configuration flow

1) Basic Information

Provide basic details to identify and manage the provider:

  • Provider Name – Enter a unique name for this configuration
  • Description – Enter the brief description of the AD configuration.
  • Enabled – Turn the provider on or off without deleting its configuration

2) LDAP Server Settings

Configure the LDAP server connection details:

SettingDescription
Server TypeSelect the type of LDAP server Microsoft Active Directory and LDAP. If you use Microsoft Active Directory, choose that option; for other LDAP servers, select LDAP from the dropdown.
Enable Single Sign OnSelecting Microsoft Active Directory provides an additional option to enable Single Sign-On (SSO).
HostSpecify the LDAP server name or IP address.
PortSpecify the port. By default, set to 389
Use SSL-secured connectionIf SSL is enabled, select this option to ensure secure data transmission between your browser and the server, protecting against unauthorized access.
User NameSpecify the username to retrieve details of domains, organizational units, groups, and users. You can also enter the distinguished name of the user, e.g., CN=admin, CN=Users, DC=TestDomain, DC=com.
PasswordSpecify password

3) Select Containers

Browse the directory structure and select the organizational units (OUs) that define the scope of user and group synchronization.

4) User Synchronization

Configure how users synchronize from the directory into the AI Command Center:

  • Map user attributes such as:   - Account name   - First/Last name   - Email   - Department   - Title   - Manager
  • Defaults are suggested automatically; adjust only for custom attributes
  • Configure synchronization options:   - Filter out disabled users   - Disable the AI Command Center user when the AD user is disabled   - Disable the AI Command Center user when the AD user is deleted
  • Specify Notify To email addresses for synchronization error notifications
note

Ensure the user has Read, List Content, and Search permissions on the schema to retrieve attributes successfully.

OptionsDescription
Filter out disabled usersCheck this option to exclude disabled users from Active Directory during synchronization.
Disable users in Control Room, which are disabled in Active DirectoryCheck this option to automatically disable AI Command Center users when they are disabled in Active Directory
Disable users in Control Room, if users are deleted in Active DirectoryCheck this option to automatically disable AI Command Center users when they are deleted from Active Directory.

4) Group Synchronization

To synchronize groups:

  1. Create the required groups in the AI Command Center.
  2. Map each AI Command Center group to its corresponding Active Directory group in the Group Synchronization tab.

The system synchronizes only mapped groups and reflects Active Directory membership changes in the corresponding AI Command Center groups.

5) Set up periodic user and group synchronization in the Schedule tab.

6) Review & Save

Review the configuration and save your changes:

  • The system creates or updates the provider configuration.
  • Existing passwords remain unchanged unless you explicitly update them.
note

After synchronizing users from Active Directory, users can sign in using their AD credentials and set a password. Once a password is set, users can authenticate using either Basic Authentication or LDAP Authentication.   If Single Sign-On (SSO) is enabled, users can sign in seamlessly using their Active Directory credentials.