Lightweight Directory Access Protocol (LDAP) is a core authentication protocol designed for directory services. Traditionally, LDAP has served as a database for storing information involving user identities like:
LDAP continues to play a key role in identity and access management (IAM). Modern security enhancements ensure that data is encrypted during transit, and insecure authentication methods vulnerable to interception are blocked.
Active Directory Federation Services (AD FS) provide single sign-on capabilities to organizations that are utilizing AD Directory Services (AD DS). It allows those with an Active Directory account to use that account on applications that are outside the boundaries of their Active Directory or applications that don’t rely on Active Directory accounts for authentication at all like DDI Central.
By creating a federation (the sharing of identity information), the user can be authenticated via his company’s Active Directory and can then be authenticated to DDI Central with a claim. All a DDI Central admin has to do is configure DDI Central to trust the incoming claims.
During an LDAP authentication process, the credentials the user enters via DDI Central, are compared to those entries stored within the LDAP directory database. If they match, the user is authenticated and granted access to DDI Central.
Active Directory Lightweight Directory Services (AD LDS) is a LDAP—based directory service similar to AD DS.
It’s designed to be used with directory-enabled applications, and it’s especially handy for an organization that may want to establish a directory of user accounts, but keep that directory separate from the organization’s AD DS infrastructure. It can be used as an identity provider with AD FS for both authentication and the generation of claims to web applications like DDI Central that can be configured to understand federation by following the steps below.
Get into the Settings module and select the Auth menu. On the Auth page, navigate to the LDAP tab and click the Configure LDAP button.
On the Configure LDAP window that appears, Follow the steps below for setting up LDAP (Lightweight Directory Access Protocol) within DDI Central.

Enabling Auto provisioning field fetches the user credentials from the LDAP server and uses them to create users in the DDI Central application server, and with this Just in time user creation, when the users from LDAP server try to access DDI application, they can easily be identified and permitted.
Automated user creation means no need of admin's manual intervention for creating all the LDAP server users one by one in the DDI application server.
This allows the admin to grant one single role type to all the users getting added in the application server. This will be helpful for implementing one time role configuration for all the users.
Make sure to configure the right role permissions for the users in the LDAP when you are choosing this provisioning scope option.

Selecting the Operator and Guest role allows network admins to configure IPAM and CLUSSTER permisions for the selected user.

This allows network admins to configure auto provisioning for specific user groups in the Active Directory. Group-based access granting helps in assigning network permissions to only the selected groups and restrict to users outside the group.
It also helps with simplifying the user selection in the Active Directory, rather than going through a bulk number of user details for specific access granting.
Under the Group-Based Access option, we have:
Provide the LDAP syntax and the folder name for selecting the user group. There are two LDAP syntaxes to be used: CN(Canonical Name) and OU(Organizational Unit).
Ex: CN=Users



For LDAPS, all the fields of LDAP are applicable to this one, except there's an extra field called TLS certificate.
TLS CERTIFICATE: Here, you need to provide the TLS certificate in .pem file format, you can use existing certificate or you can upload a new one. This TLS certificate is needed to authenticate and verify the server where LDAP is configured.
Click Save to activate the LDAP configuration settings after all required fields have been filled in.
These configurations enable DDI Central to authenticate users against the specified LDAP server with the chosen level of security, making it effortless for you to use centralized directory services like Active Directory Federation Services (AD FS) for your distributed Microsoft network infrastructure.
Info: You can also add an extra layer of security to user accounts by coupling LDAP credentials with with time-sensitive codes from any TOTP-enabled authenticators.Both LDAP and LDAPS configurations can also be edited to make changes, and here for LDAPS, the TLS cetfificate has two options to select: Use existing and UpdateSelect the Use exisitng option if you want to use the already uploaded TLS certificate, or select the Update option if you want to use a new TLS certificate, and provide the new TLS certificate in the NEW TLS CERTIFICATE

