LDAP provides a standardized way to query and modify directory services that store user identities, organizational data, and access control information across enterprise environments.
Why it matters
- Foundation for centralized identity management in most enterprises.
- Enables single sign-on by providing a unified user directory for authentication.
- Supports hierarchical organizational structures (OUs, groups, users).
- Critical for integration between identity providers, applications, and network resources.
Key concepts
- Directory Information Tree (DIT): Hierarchical structure organizing entries from root to leaves.
- Distinguished Name (DN): Unique identifier for each entry (e.g., cn=john,ou=users,dc=company,dc=com).
- Attributes: Key-value pairs describing entry properties (cn, mail, memberOf).
- Schema: Definitions of object classes and attributes allowed in the directory.
- Bind operation: Authentication step before performing directory operations.
Common LDAP implementations
- Microsoft Active Directory: Most widely deployed, extends LDAP with Windows-specific features.
- OpenLDAP: Open-source implementation for Linux/Unix environments.
- FreeIPA: Red Hat's integrated identity solution combining LDAP, Kerberos, and DNS.
- Apache Directory Server: Java-based LDAP server.
Security considerations
- Always use LDAPS (LDAP over TLS) on port 636 instead of plaintext LDAP on port 389.
- Implement strong bind authentication rather than anonymous binds.
- Apply principle of least privilege to service accounts querying the directory.
- Monitor LDAP queries for enumeration attacks and credential stuffing.
- Use read-only replicas for application queries to protect the master directory.
Common pitfalls
- Exposing LDAP services directly to the internet.
- Using simple bind authentication over unencrypted connections.
- Granting applications excessive directory permissions.
- Not implementing connection pooling, causing performance issues.
Related Articles
View all articlesThreat Modeling with STRIDE and DREAD: A Complete Guide to Proactive Security Architecture
Master threat modeling with STRIDE and DREAD frameworks to identify, classify, and prioritize security threats before they become vulnerabilities. This comprehensive guide covers data flow diagrams, mitigation mappings, MITRE ATT&CK integration, and building an enterprise threat modeling program.
Read article →Azure AD Is Now Microsoft Entra ID: What Changed and What It Means
Microsoft renamed Azure Active Directory to Microsoft Entra ID. Learn what changed, what stayed the same, and how this affects your organization's identity management.
Read article →pyproject.toml - Complete Guide with Examples & Best Practices
Master Python pyproject.toml configuration: build-system, project metadata, tool settings. Examples for Hatchling, setuptools, Poetry-core, Flit. PEP 621 compliant templates.
Read article →HashiCorp Vault Policies: Complete ACL and Authorization Guide
Master Vault policies and ACLs with HCL syntax, capabilities, path patterns, wildcards, and policy examples. Complete guide to Vault authorization and access control.
Read article →Explore More Identity & Access Management
View all termsAuthentication vs Authorization
Authentication verifies who you are, while authorization determines what you can do.
Read more →FIDO2
An open authentication standard that enables passwordless and phishing-resistant login using hardware security keys or platform authenticators.
Read more →Identity and Access Management (IAM)
The policies and technologies used to verify identities, govern permissions, and log access across systems.
Read more →Kerberos
A network authentication protocol that uses secret-key cryptography and trusted third parties to verify user and service identities without transmitting passwords.
Read more →Multi-Factor Authentication (MFA)
An authentication method that requires users to provide two or more verification factors to gain access.
Read more →OAuth (Open Authorization)
An open standard for delegated access authorization that allows applications to access user resources without exposing credentials.
Read more →