LDAP

The LDAP connector lets you configure a generic LDAP server.

Supported versions

This connector supports LDAP versions 2 and 3.

Before you begin

Before using the LDAP connector, do the following tasks:

  • In your Google Cloud project:
    • Ensure that network connectivity is set up. For information about network patterns, seeNetwork connectivity.
    • Grant theroles/connectors.admin IAM role to the user configuring the connector.
    • Grant the following IAM roles to the service account that you want to use for the connector:
      • roles/secretmanager.viewer
      • roles/secretmanager.secretAccessor

      A service account is a special type of Google account intended to represent a non-human user that needs to authenticate and be authorized to access data in Google APIs. If you don't have a service account, you must create a service account. The connector and the service account must belong to the same project. For more information, seeCreating a service account.

    • Enable the following services:
      • secretmanager.googleapis.com (Secret Manager API)
      • connectors.googleapis.com (Connectors API)

      To understand how to enable services, seeEnabling services.

    If these services or permissions have not been enabled for your project previously, you are prompted to enable them when configuring the connector.

Configure the connector

A connection is specific to a data source. Itmeans that if you have many data sources, you must create a separate connectionfor each data source. To create a connection, do the following:

  1. In theCloud console, go to theIntegration Connectors > Connections page and then select or create a Google Cloud project.

    Go to the Connections page

  2. Click+ CREATE NEW to open theCreate Connection page.
  3. In theLocation section, choose the location for the connection.
    1. Region: Select a location from the drop-down list.

      For the list of all the supported regions, seeLocations.

    2. ClickNEXT.
  4. In theConnection Details section, complete the following:
    1. Connector: SelectLDAP from the drop down list of available Connectors.
    2. Connector version: Select the Connector version from the drop down list of available versions.
    3. In theConnection Name field, enter a name for the Connection instance.

      Connection names must meet the following criteria:

      • Connection names can use letters, numbers, or hyphens.
      • Letters must be lower-case.
      • Connection names must begin with a letter and end with a letter or number.
      • Connection names cannot exceed 49 characters.
    4. Optionally, enter aDescription for the connection instance.
    5. Optionally, enableCloud logging, and then select a log level. By default, the log level is set toError.
    6. Service Account: Select a service account that has therequired roles.
    7. Optionally, configure theConnection node settings:

      • Minimum number of nodes: Enter the minimum number of connection nodes.
      • Maximum number of nodes: Enter the maximum number of connection nodes.

      A node is a unit (or replica) of a connection that processes transactions. More nodes are required to process more transactions for a connection and conversely, fewer nodes are required to process fewer transactions. To understand how the nodes affect your connector pricing, see Pricing for connection nodes. If you don't enter any values, by default the minimum nodes are set to 2 (for better availability) and the maximum nodes are set to 50.

    8. Note: You can customize the connection node values only if you are a Pay-as-you-go customer.
    9. Base DN: The base portion of the distinguished name, used for limiting results to specific subtrees.
    10. Auth Mechanism: The authentication mechanism to be used when connecting to the LDAP server.
    11. Follow Referrals: Whether or not to follow LDAP referrals returned by the LDAP server.
    12. Friendly GUID: Whether to return GUID attribute values in a human readable format.
    13. Friendly SID: Whether to return SID attribute values in a human readable format.
    14. LDAP Version: The LDAP version used to connect to and communicate with the server.
    15. Scope: Whether to limit the scope of the search to the whole subtree (BaseDN and all of its descendants), a single level (BaseDN and its direct descendants), or the base object (BaseDN only).
    16. Optionally, click+ ADD LABEL to add a label to the Connection in the form of a key/value pair.
    17. ClickNEXT.
  5. In theDestinations section, enter details of the remote host (backend system) you want to connect to.
    1. Destination Type: Select aDestination Type.

      If you want to establish a public connection to your backend systems with additional security, you can considerconfiguring static outbound IP addresses for your connections, and then configure your firewall rules to allowlist only the specific static IP addresses.

      To enter additional destinations, click+ADD DESTINATION.

    2. ClickNEXT.
  6. In theAuthentication section, enter the authentication details.
    1. Select anAuthentication type and enter the relevant details.

      The following authentication types are supported by the LDAP connection:

      • Username and password
    2. To understand how to configure these authentication types, seeConfigure authentication.

    3. ClickNEXT.
  7. Review: Review your connection and authentication details.
  8. ClickCreate.

Configure authentication

The LDAP connector supports the basic authentication type. If your destination or LDAP instance is hosted on a VM or is in a private network,create an endpoint attachment. For information about how to install and configure LDAP, seeLDAP installation.

  • Username and password
    • Username: Username for connector
    • Password: Secret Manager Secret containing the password associated with the connector.

Basic authentication connection type

The following table lists the sample configuration values for the Basic authentication connection type.
Field nameDetails
Regionus-central1
ConnectorLDAP
Connector version1
Connection Namegoogle-ldap-basicauth-conn
Service AccountSERVICE_ACCOUNT_NAME@PROJECT_ID.iam.gserviceaccount.com
Base DNCN=Users,DC=NAME,DC=com
Auth MechanismSIMPLE
LDAP Version3
ScopeWHOLESUBTREE
Verbosity Level5
Minimum number of nodes2
Maximum number of nodes50
UsernameUSER_NAME
PasswordPASSWORD
Secret Version1

Entities, operations, and actions

All the Integration Connectors provide a layer of abstraction for the objects ofthe connected application. You can access an application's objects only through this abstraction. The abstraction is exposed to you as entities, operations, and actions.

Note: You can view the entities, operations, and actions of a connector in theConnectors task.
  • Entity:An entity can be thought of as an object, or a collection of properties, in theconnected application or service. The definition of an entity differs from a connector to a connector. For example, in a database connector, tables are the entities, in a file server connector, folders are the entities, and in a messaging system connector, queues are the entities.

    However, it is possible that a connector doesn't support or have any entities, in which case theEntities list will be empty.

  • Operation:An operation is the activity that you can perform on an entity. You can performany of the following operations on an entity:

    Selecting an entity from the available list, generates a list ofoperations available for the entity. For a detailed description of the operations, see the Connectors task'sentity operations. However, if a connector doesn't support any of the entity operations, such unsupported operations aren't listed in theOperations list.

  • Action:An action is a first class function that is made available to the integrationthrough the connector interface. An action lets you make changes to an entity or entities, and vary from connector to connector. Normally, an action will have some input parameters, and an output parameter. However, it is possible that a connector doesn't support any action, in which case theActions list will be empty.
Note:All entities and actions will have a schema associated with them. For example, an action schema will have the parameter details such as; the parameternames, and its corresponding data type. The schema (metadata) for entities and actions is fetched by the connection atruntime from your backend. If there are any updates to the schema, such updates won't be automatically reflected in your existing connections; you must manually refresh the schema. To refreshthe schema for a connection, open theConnection details page of the connection, and then clickRefresh connection schema.

Actions

This section lists all the actions supported by the LDAP connector.

Note: The results of all the actions will be available as a JSON response in theConnectors task'sconnectorOutputPayload response parameter after you run your integration.

MoveToDN action

This action moves objects from one DN (distinguished name) to another DN.

Input parameters of the MoveToDN action

Parameter NameData TypeRequiredDescription
DNStringYesThe current DN of the object to be moved on the LDAP server. For example,CN=Google Cloud,OU=Bangalore,OU=India,OU=Domain_Users,DC=test-ldap,DC=com.
NewParentDNStringYesThe new parent DN of the object. For example,OU=Mysore,OU=India,OU=Domain_Users,DC=test-ldap,DC=com.

Output parameters of the DownloadFile action

This action returns the status 200 (OK) with a response body indicating the results.

To understand how to configure theMoveToDN action, seeAction examples.

GetAttributes action

This action gets all the attribute names and values of a DN.

Input parameters of the GetAttributes action

Parameter NameData TypeRequiredDescription
DNStringYesDistinguished name of the desired LDAP object. If unspecified, the BaseDN from the connection string will be used.

Output parameters of the GetAttributes action

This action returns the status 200 (OK) with a response body indicating the results.

To understand how to configure theGetAttributes action, seeAction examples.

AddMembersToGroup action

This action adds users to a group.

Input parameters of the GetAttributes action

Parameter NameData TypeRequiredDescription
GroupIdStringYesID of the group to which you want to add the users.
UserDNsStringYesThe UserDNs aggregate or a temporary table that contains the DN of the users to be added to the Group. The value should be the DN of the user record.

Output parameters of the AddMembersToGroup action

This action returns the status 200 (OK) with a response body indicating the results.

To understand how to configure theAddMembersToGroup action, seeAction examples.

Action examples

This section describes how to perform some of the actions in this connector.

Example - Move an object from one DN to another DN

  1. In theConfigure connector task dialog, clickActions.
  2. Select theMoveToDN action, and then clickDone.
  3. In theTask Input section of theConnectors task, clickconnectorInputPayload and then enter a value similar to the following in theDefault Value field:
    {"DN":"CN=Google Cloud,OU=Bangalore,OU=India,OU=Domain_Users,DC=test-ldap,DC=com","NewParentDN":"OU=Mysore,OU=India,OU=Domain_Users,DC=test-ldap,DC=com"}
  4. This example moves an object from one DN to another DN. If the action is successful, your connector task'sconnectorOutputPayload response parameter will have a value similar to the following:

    [{"Success":null,"result":"[ok]","modified":"true","rss:title":"The movement was successful.","resultcode":"0"}]

Example - Get attributes of a DN

  1. In theConfigure connector task dialog, clickActions.
  2. Select theGetAttributes action, and then clickDone.
  3. In theTask Input section of theConnectors task, clickconnectorInputPayload and then enter a value similar to the following in theDefault Value field:
    {"DN":"CN=Bangalore user,OU=Bangalore,OU=India,OU=Domain_Users,DC=test-ldap,DC=com"}
  4. This example gets the attribute of the specified DN. If the action is successful, your connector task'sconnectorOutputPayload response parameter will have a value similar to the following:

    [{"AttributeName":"_op","AttributeValue":"ldapadoGetAttributes"},{"AttributeName":"usncreated","AttributeValue":"36006"},{"AttributeName":"countrycode","AttributeValue":"0"},{"AttributeName":"badpwdcount","AttributeValue":"0"},{"AttributeName":"dn","AttributeValue":""},{"AttributeName":"dn","AttributeValue":"CN=Bangalore user,OU=Bangalore,OU=India,OU=Domain_Users,DC=test-ldap,DC=com"},{"AttributeName":"whenchanged","AttributeValue":"20230913125155.0Z"},{"AttributeName":"objectclass","AttributeValue":"top"},{"AttributeName":"objectclass","AttributeValue":"person"},{"AttributeName":"objectclass","AttributeValue":"organizationalPerson"},{"AttributeName":"objectclass","AttributeValue":"user"},{"AttributeName":"primarygroupid","AttributeValue":"513"},{"AttributeName":"givenname","AttributeValue":"Bangalore"},{"AttributeName":"dscorepropagationdata","AttributeValue":"16010101000001.0Z"},{"AttributeName":"sn","AttributeValue":"user"},{"AttributeName":"useraccountcontrol","AttributeValue":"512"},{"AttributeName":"cn","AttributeValue":"Bangalore user"},{"AttributeName":"codepage","AttributeValue":"0"},{"AttributeName":"accountexpires","AttributeValue":"9223372036854775807"},{"AttributeName":"userprincipalname","AttributeValue":"user-1@test-l  }]

Example - Add users to a group

  1. In theConfigure connector task dialog, clickActions.
  2. Select theAddMembersToGroup action, and then clickDone.
  3. In theTask Input section of theConnectors task, clickconnectorInputPayload and then enter a value similar to the following in theDefault Value field:
    {"GroupId":"1|CN=Cert Publishers,CN=Users,DC=test-ldap,DC=com","UserDNs":"[{\"DN\":\"CN=Google AI,CN=Users,DC=test-ldap,DC=com;CN=Guest,CN=Users,DC=test-ldap,DC=com\"}]"}
  4. This example adds a user DN to the group with ID1|CN=Cert Publishers,CN=Users,DC=test-ldap,DC=com. If the action is successful, your connector task'sconnectorOutputPayload response parameter will have a value similar to the following:

    [{"Success":"True"}]

Entity operation examples

Example - List users

This example lists all the users in theUser entity.

  1. In theConfigure connector task dialog, clickEntities.
  2. SelectUser from theEntity list.
  3. Select theLIST operation, and then clickDone.
  4. Optionally, you can filter the result set. To filter the result set, in theTask Input section of theConnectors task, set thefilterClause as per your requirement.

    For example, setting the filter clause toId='1|CN=admin,CN=Users,DC=test-ldap,DC=com', lists only those records whose Id matches this criteria.

Example - Get a user record

This example gets a user detail from theUser entity.

  1. In theConfigure connector task dialog, clickEntities.
  2. SelectUser from theEntity list.
  3. Select theGET operation, and then clickDone.
  4. In theTask Input section of theConnectors task, clickEntityId and then enter1|CN=admin,CN=Users,DC=test-ldap,DC=com in theDefault Value field.

    Here,1|CN=admin,CN=Users,DC=test-ldap,DC=com is one of the primary key values of theUser entity.

Example - Create a user record

This example creates a user record in theUser entity.

  1. In theConfigure connector task dialog, clickEntities.
  2. SelectUser from theEntity list.
  3. Select theCreate operation, and then clickDone.
  4. In theTask Input section of theConnectors task, clickconnectorInputPayload and then enter a value similar to the following in theDefault Value field:
    {"RDN":"CN=MPATAI","ObjectClass":"top;person;organizationalPerson;user"}

    If the integration is successful, your connector task'sconnectorOutputPayload field will have a value similar to the following:

    {"Id":"1|CN=MPATAI,CN=Users,DC=test-ldap,DC=com"}

Example - Update a ticket

This example updates the specified user record in theUser entity.

  1. In theConfigure connector task dialog, clickEntities.
  2. SelectUser from theEntity list.
  3. Select theUpdate operation, and then clickDone.
  4. In theTask Input section of theConnectors task, clickconnectorInputPayload and then enter a value similar to the following in theDefault Value field:
    {"PostalCode":"560040"}
  5. ClickentityId, and then enter1|CN=admin,CN=Users,DC=test-ldap,DC=com in theDefault Value field.

    Alternately, instead of specifying theentityId, you can also set thefilterClause to1|CN=admin,CN=Users,DC=test-ldap,DC=com.

    If the integration is successful, your connector task'sconnectorOutputPayload field will have a value similar to the following:

    {"Id":"1|CN=admin,CN=Users,DC=test-ldap,DC=com"}

Example - Delete a user record

This example deletes a user record from theUser entity.

  1. In theConfigure connector task dialog, clickEntities.
  2. SelectUser from theEntity list.
  3. Select theDelete operation, and then clickDone.
  4. In theTask Input section of theConnectors task, clickentityId and then enter1|CN=admin,CN=Users,DC=test-ldap,DC=com in theDefault Value field.
  5. Alternately, ifUser entity has composite primary keys, instead of specifying theentityId, you can set thefilterClause. For example,Id='1|CN=admin,CN=Users,DC=test-ldap,DC=com' and DN='CN=admin,CN=Users,DC=test-ldap,DC=com'.

Create connections using Terraform

You can use theTerraformresource to create a new connection.

To learn how to apply or remove a Terraform configuration, seeBasic Terraform commands.

To view a sample terraform template for connection creation, seesample template.

When creating this connection by using Terraform, you must set the following variables in your Terraform configuration file:

Parameter nameData typeRequiredDescription
base_dnSTRINGTrueThe base portion of the distinguished name, used for limiting results to specific subtrees.
auth_mechanismENUMTrueThe authentication mechanism to be used when connecting to the LDAP server. Supported values are: SIMPLE, DIGESTMD5, NEGOTIATE
follow_referralsBOOLEANFalseWhether or not to follow LDAP referrals returned by the LDAP server.
friendly_guidBOOLEANFalseWhether to return GUID attribute values in a human readable format.
friendly_sidBOOLEANFalseWhether to return SID attribute values in a human readable format.
ldapversionENUMTrueThe LDAP version used to connect to and communicate with the server. Supported values are: 2, 3
scopeENUMTrueWhether to limit the scope of the search to the whole subtree (BaseDN and all of its descendants), a single level (BaseDN and its direct descendants), or the base object (BaseDN only). Supported values are: WHOLESUBTREE, SINGLELEVEL, BASEOBJECT

Use the LDAP connection in an integration

After you create the connection, it becomes available in bothApigee Integration and Application Integration. You can use the connectionin an integration through the Connectors task.

  • To understand how to create and use the Connectors task in Apigee Integration, seeConnectors task.
  • To understand how to create and use the Connectors task in Application Integration, seeConnectors task.

Get help from the Google Cloud community

You can post your questions and discuss this connector in the Google Cloudcommunity atCloud Forums.

What's next

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.