Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

Get Quote

 
  

What is LDAP?

The Lightweight Directory Access Protocol (LDAP), introduced in the year 1993, is a core protocol that eventually paved the way for Microsoft's Active Directory and Open LDAP. It is an open and cross-platform protocol used to maintain distributed directory information in an organized and easy-to-access manner. LDAP also serves as a directory services authentication protocol by providing a common language that applications can use to communicate with servers of other directory services.

Types of LDAP authentication

There are three types of authentication supported by LDAPv3,
  • Anonymous
  • Simple
  • SASL

Anonymous authentication

Anonymous authentication provides users access to resources without prompting them for a username or password. A client that sends a LDAP request without doing a "bind" is treated as an anonymous client. Bind operations are used to authenticate a client to a directory server.

Simple authentication

In simple authentication, the client sends its distinguished name (DN) and password in clear-text format. This mechanism has security problems because the password can be read from the network. Hence, simple authentication must be used within an encryption channel.

SASL authentication

SASL stands for Simple Authentication and Security Layer. It is a challenge-response protocol in which data is exchanged between the client and the server for authenticating and establishing a security layer on which subsequent communication will take place. SASL binds the LDAP server to other authentication mechanisms, such as Kerberos.

How does LDAP authentication work?

LDAP authentication follows a client-server model. The client is a system or application requesting access to information in an LDAP database, while the server is an LDAP server. The LDAP authentication process can be divided into two steps as follows:

Step 1 - Username Resolution

To authenticate a username, the user's distinguished name (DN) is required. The DN is a sequence of relative domain names (RDN) connected by commas (,).

For example, here's how a user named Clara's DN looks. The DN resembles a path starting with the Active Directory root.

CN=Clara Holt, OU=Users, DC=ADAuditPlus, DC=COM

Given the length and various attributes that are included in the DN, it is difficult for a user to remember it when providing the credentials for authentication. So instead of the DN, the client collects the user's username or email address and performs a DN resolution, which is analogous to a DNS resolution when you're looking up a website's IP address.

The username or email address is run against a database of all user entries until an exact match turns up. The directory attributes to search for are specified in the searchFilter configuration parameter.

ldapAuth.dnResolution.searchFilter = (|(uid=%u)(mail=%u)) %u is replaced with the user identifiers collected in the login form.
A couple of requisites for effective DN resolution:
  • Always ensure users have unique usernames and email addresses. If more than one entry share the same identifier, authentication will fail.
  • Ensure that all identifying attributes present in the login form are defined in the schema. For example, if a user's email address is not defined in the database, the resolution cannot be performed and authentication will fail.
Step 2 - User's password validation

LDAP authentication uses a bind command to authenticate users and give them the required access. To validate the password, the DN of the user and the password provided by the user are scanned. This password provided by the user is checked against the value stored in the schema attribute named userPassword.

  • The bind operation works even for passwords values that have been hashed or encrypted.
  • Again, as in the previous step, for successful authentication, the userPassword attribute must have a defined value.

Simplify LDAP auditing and reporting with ADAudit Plus

Get your free trial

Fully functional 30-day trial

Monitoring LDAP with ADAudit Plus

Monitoring LDAP servers is necessary to ensure service availability and performance. By tracking the LDAP queries processed, IT administrators can detect suspicious queries that may be used to perform reconnaissance on the Active Directory environment, and curb attacks. ADAudit Plus simplifies LDAP monitoring by offering predefined LDAP Auditing reports along with intuitive graphical representation of the same for the ease of comprehension.

Steps to track LDAP events

Once ADAudit Plus has been installed, it can automatically configure audit policies required for LDAP auditing. To enable automatic configuration:
Log in to the ADAudit Plus web console → Domain Settings → Audit Policy: Configure.

LDAP events can be monitored by following the below mentioned steps:
  • Login to ADAudit Plus.
  • Select the required Domain from the dropdown list.
  • Go to the Server Audit tab.
  • Navigate to LDAP Auditing.
  • Select the desired report from the ones listed under LDAP Auditing.
  • The following are some of the information that can be obtained from the reports listed under LDAP Auditing:
    • Detailed information about LDAP authentication requests from clients including who made the request, when the request was made, and so on.
    • The recent LDAP queries processed by Active Directory.
    • LDAP server errors.
    • Attempts to make LDAP connections and details on timed-out connections.

ADAudit Plus comes bundled with more than 200 predefined reports that make AD auditing easier. The solution also sends real-time alerts for critical events and helps you to secure your network from threats and boosts your IT security posture. Check out the capabilities of ADAudit Plus here.

More related links

     

Native auditing becoming a little too much?

Try ADAudit Plus login monitoring tool to audit, track, and respond to malicious login and logoff actions instantaneously.

Try ADAudit Plus for free

 

ADAudit Plus Trusted By