LDAP Integration
Setting up LDAP
Lightweight Directory Access Protocol (LDAP) is a centralized access control system used by many small and medium-scale organizations.
By settings up LDAP service, you able to login to OneHash account by using LDAP credentials.
1. Prerequisites
To use LDAP, you will first need to install the ldap3 Python module. To do this, open a terminal session on your server that hosts the OneHash instance. Go to the frappe-bench directory. run the command: ./env/pip install ldap3
You are now ready to enable the LDAP service in OneHash .
2. Setting up LDAP
To setup LDAP, go to
Home > Integrations > LDAP Settings
Many parameters are mandatory to allow OneHash to connect to LDAP. They are:
LDAP Server URL: This is the URL to your LDAP server. Must be in the form of ldap://yourserver:port or ldaps://yourserver:port
Base Distinguished Name (DN): This is the distinguished name of the user that has permissions to look up user details on your LDAP server. This should be a user that only has read-only permissions on your LDAP Server.
Password for Base DN: This is the password for the user above, that is used to look up user details on your LDAP server.
Organization Unit of Users: This is the DN of the Organizational Unit that all users in your LDAP server must be part of to be able to log into OneHash .
Default Role on Creation: When the user is created in OneHash , they will be assigned with this default role, the first time they log in.
LDAP Search String: This field allows OneHash to match the user/email entered in the OneHash login screen, with the LDAP Server. For example, you could use email address, or username depending on your preference.
It must be entered in the format: LDAPFIELD={0}
Active Directory username example: sAMAccountName={0}
Open LDAP username example: uid={0}
LDAP Email Field: Specifies the LDAP field that contains the email address of the user.
Active Directory and Open LDAP example: mail
LDAP Username Field: Specifies the LDAP field that contains the username of the user.
Active Directory example : sAMAccountName
Open LDAP example: uid
LDAP First Name Field: Specifies the LDAP field that contains the first name of the user.
Active Directory example: givenName
Open LDAP example: sn
There are many other non-mandatory fields that you can use to map your LDAP user fields to the OneHash user fields. They are:
Middle Name
Phone
Mobile
Once your settings are correct, you can click the Enabled checkbox at the top. When attempting to enable LDAP, OneHash will try and connect to the LDAP server to ensure the settings are correct. If it fails, you will not be able to enable LDAP and will receive an error message.
The error message will indicate the issue that needs to be resolved to continue.
After setting enabling LDAP, on the login screen, the system enables Login Via LDAP option.
2.1 LDAP Security
In the LDAP Security section, You have many options to connect securely to your LDAP server.
1. SSL/TLS Mode
Specifies whether you want to start a TLS session on initial connection to the LDAP server.
2. Require Trusted Certificate
Specifies if you require a trusted certificate to connect to the LDAP server
If you are specifying a trusted certificate, you will need to specify the paths to your certificate files. These files are to be placed on your OneHash server, and the following fields should be an absolute path to the files on your server. The certificate fields are:
3. Path to private Key File
4. Path to Server Certificate
5. Path to CA Certs File
2.2 LDAP Group Mappings
OneHash also allows you to automatically map multiple LDAP groups to the appropriate OneHash roles. For example, you may want all of your Accounting employees, to automatically have the Accounts User Role.
Ensure that you fill out the LDAP Group Field to allow this. This is the LDAP field that is found on a user object in LDAP, that has all of the groups the user is a member of.
For Active Directory and Open LDAP, this field should be set to memberOf.
Open LDAP may need this field to be enabled on your LDAP server. Please see examples on the internet for more details.
Note that all OneHash roles will be checked each time a user logs on and will be removed or added to the user's permissions.
In the LDAP Settings area, there are two dropdowns.
SSL/TLS Mode - set this to StartTLS to connect to your LDAP server using StartTLS. If your LDAP server does not support StartTLS, setting this to StartTLS will result in an error StartTLS is not supported. Check the configuration on your LDAP server if you receive this error.
Require Trusted Certificate - if you change this to Yes then the certificate provided by the LDAP server must be trusted by the Frappe/OneHash server. If you would rather use StartTLS with a self-signed (untrusted) certificate, set this to No. If you do not use StartTLS, this setting is ignored.
Updated on: 22/03/2023
Thank you!