Legacy applications that directly connect to AD/LDAP using LDAP clients can now benefit from an additional layer of security. Our proxy ensures that every authentication request is routed through PlusAuth, enabling MFA to protect against unauthorized access and potential security breaches.
Usage
After you download release from releases run the application with a parameter pointing to your config file. For configuration file reference, have a look at to Configuration section.
Following flow is applicable when MFA enabled in configuration for a ldap server instance:
Pre-Requisites
As you have seen in the flow above LDAP Proxy must communicate with LDAP server as well as PlusAuth. Following steps are required in order to configure LDAP Proxy to work flawlessly.
In PlusAuth Dashboard:
- Create a Client with type of
Server to Server Application
- Enable
password
Grant Type - Enable Grant Types corresponding to your preferred MFA method/s. For example, if you are going to use SMS, you have to enable
urn:plusauth:params:oauth:grant-type:mfa-sms
grant type.
- Enable
- Create an AD/LDAP Connection from Dashboard > Connections
- Configure AD/LDAP Connection to be able to connect your AD/LDAP Server.
- In Enabled Clients section make sure you have included the client we have created in the last step.
- Enable one of Multi-Factor Authentication (MFA) methods. Currently supported methods are
SMS
,Email
,OTP
andPush
Now you are ready to configure your LDAP Proxy.
Configuration
Ldap Proxy uses json
as configuration file format. Here is configuration file reference:
With the above configuration you would access to your LDAP Proxy with ldaps://my-connection-name.plusauth.com:8389
. For example: