LDAP

Configuring the LDAP integration for Veza Lifecycle Management

Overview

The Veza LDAP integration supports Lifecycle Management as both a Source of Identity and a Target System. Organizations using Red Hat Identity Manager, FreeIPA, OpenLDAP, or other LDAPv3-compliant directories can use their LDAP directory to trigger lifecycle policy actions, and as a target for automated user and group management.

Action Type
Description
LDAP Users

SOURCE_OF_IDENTITY

LDAP can act as the authoritative identity source that triggers LCM policy actions

SYNC_IDENTITIES

Synchronizes identity attributes between systems, with options to create new identities and update existing ones

MANAGE_RELATIONSHIPS

Controls group memberships for LDAP users

DEPROVISION_IDENTITY

Disables the LDAP account by setting a configurable activation attribute

DELETE_IDENTITY

Permanently removes the user entry from the LDAP directory

CREATE_ENTITLEMENT

Creates new LDAP groups

Prerequisites

  1. You need an existing LDAP integration in Veza, or add a new one for use with Lifecycle Management.

  2. The LDAP integration must have completed at least one successful extraction.

  3. An Insight Point with network access to your LDAP server is required if the server is not publicly accessible.

  4. The service account (bind DN) configured in the integration must have write permissions on the directory entries that Veza will manage.

  5. For MANAGE_RELATIONSHIPS and CREATE_ENTITLEMENT, the group_member_attribute and groups_object_class fields must be explicitly set in the integration configuration. These are required at runtime and are not inferred automatically.

Required service account permissions

The bind DN requires these LDAP operations beyond read access for discovery:

Operation
Required for

add on user entries in target OUs

SYNC_IDENTITIES (create user)

modify (replace) on user attributes

SYNC_IDENTITIES (update), DEPROVISION_IDENTITY

delete on user entries

DELETE_IDENTITY

modify (add/delete) on group member or uniqueMember

MANAGE_RELATIONSHIPS

add and delete on group entries

CREATE_ENTITLEMENT

The exact ACL syntax varies by LDAP implementation. For Red Hat Identity Manager and FreeIPA, add ACIs granting write, add, and delete rights to the service account on the relevant object classes and attributes in the target OUs. For OpenLDAP, grant write access using access to directives in slapd.conf or cn=config.

Enabling Lifecycle Management for LDAP

  1. In Veza, go to the Integrations page.

  2. Search for or select your LDAP integration.

  3. Check the box to Enable usage for Lifecycle Management.

Configure the extraction schedule to ensure your LDAP data remains current:

  1. Go to Veza Administration > System Settings.

  2. In Pipeline > Extraction Interval, set your preferred interval.

  3. Optionally, set a custom override for the LDAP integration in the Active Overrides section.

Configuring deprovisioning

DEPROVISION_IDENTITY works by setting a specific attribute on the user entry. Because different LDAP implementations use different attributes to represent account status, you must configure which attribute Veza should set and what values represent active and inactive states.

Two configuration approaches are supported:

Using an "inactive" attribute (the attribute is present when the account is disabled):

Parameter
Description
Example

inactive_user_attribute

Attribute to set when disabling or re-enabling

nsAccountLock

inactive_user_value_when_inactive

Value that marks the account as disabled

true

inactive_user_value_when_active

Value that marks the account as enabled

false

Using an "active" attribute (the attribute reflects the enabled state):

Parameter
Description
Example

active_user_attribute

Attribute to set when disabling or re-enabling

loginDisabled

active_user_value_when_inactive

Value that marks the account as disabled

TRUE

active_user_value_when_active

Value that marks the account as enabled

FALSE

At least one of these approaches must be configured for DEPROVISION_IDENTITY to work. If neither is configured, the action will fail.

Common attribute mappings by directory:

Directory
Recommended approach
Attribute
Inactive value
Active value

Red Hat Identity Manager / FreeIPA

inactive_user_attribute

nsAccountLock

true

false

Generic LDAPv3

active_user_attribute

implementation-specific

implementation-specific

implementation-specific

Supported actions

SYNC_IDENTITIES

Creates or updates LDAP user entries as part of a provisioning workflow. The DN (id) is used as the unique identifier for all sync operations. The email attribute maps to the mail LDAP attribute. Custom properties configured on the integration are available as sync attributes and map bidirectionally between snake_case attribute names and native LDAP attribute names.

Required attributes for user creation: DN (id) is the only universally required attribute. Depending on your directory's configuration, your organization's LDAP implementation may require additional attributes, such as cn, sn, uid, or schema-specific object class attributes. Veza cannot validate these requirements in advance. Please consult your LDAP administrator and directory documentation to identify which attributes are required in your environment.

Matching on attributes other than DN: To match LDAP identities by an attribute other than DN (such as an employee ID), use a FROM_ENTITY_ATTRIBUTE lookup in your workflow configuration. This is a supported workaround while native configurable unique identifier support is under development.

MANAGE_RELATIONSHIPS

Adds or removes users from LDAP groups. Both groupOfUniqueNames (with uniqueMember) and groupOfNames (with member) schemas are supported. The group_member_attribute setting in the integration configuration determines which attribute is used; it must be explicitly set for this action to work.

DEPROVISION_IDENTITY

Disables the LDAP user account using the activation attribute configuration described in Configuring deprovisioning. The user entry is preserved in the directory.

Inactive user workflows with Kerberos last-login date: In Kerberos-enabled directories such as Red Hat Identity Manager and FreeIPA, the krblastsuccessfulauth attribute records the last successful authentication date. To identify and disable accounts inactive for more than 30 days, add krblastsuccessfulauth as a Custom Date Property in the LDAP integration configuration. You can then build an LCM policy using LDAP as the Source of Identity, filter on krblastsuccessfulauth older than 30 days, and trigger DEPROVISION_IDENTITY on the matched LDAP account.

DELETE_IDENTITY

Permanently removes the LDAP user entry from the directory. This operation cannot be undone. Use DEPROVISION_IDENTITY to preserve the entry for audit purposes while blocking access.

CREATE_ENTITLEMENT

Creates a new group entry in the LDAP directory. The group object class and membership attribute are determined by the configuration of the LDAP integration.

Last updated

Was this helpful?