Setting Up LDAP
2 minute read.
Last Modified 2022-05-14 23:42 +0300TrueNAS includes an Open LDAP client for accessing information from an LDAP server. An LDAP server provides directory services for finding network resources such as users and their associated permissions.
To integrate an LDAP server with TrueNAS, go to Directory Services > LDAP.
Enter any LDAP server host names or IP addresses. Separate entries with an empty space. Entering multiple host names or IP addresses creates an LDAP failover priority list.
Enter the Base DN.
This is the top level of the LDAP directory tree used when searching for resources.
For example, dc=test,dc=org
.
Enter the Bind DN.
This is the administrative account name on the LDAP server.
For example, cn=Manager,dc=test,dc=org
.
Next, enter the Bind Password. This is the password associated with the account in Bind DN.
The final basic option is Enable. Leaving the Enable checkbox clear disables the LDAP configuration without deleting it. It can be enabled at a later time without reconfiguring the options.
To further modify the LDAP configuration, click ADVANCED OPTIONS.
See LDAP Screen for information on basic and advanced option settings.
See Kerberos for more information on using Kerberos..
To configure LDAP certificate-based authentication for the LDAP provider to sign, see Certificate Signing Requests.
Samba Schema is deprecated in Samba 4.13.0. Set Samba Schema if LDAP authentication for SMB shares is required and the LDAP server is already configured with Samba attributes. If Samba Schema is set, select the type of schema from the Schema dropdown.