• Contact Us
  • Home
  • Reference

Using OpenLDAP with Authentik

Learn how to set the configuration settings so that Authentik will use your OpenLDAP service for user information and authentication

Written by Marty Heyman

Updated at January 28th, 2026

  • Quick Start
  • Installation
    Best Practices Configuration Troubleshooting Design Performance Platform
  • Maintenance
    Releases Upgrade
  • Reference
+ More

Table of Contents

Name Slug Connection settings Server URI TLS Verification Certificate Bind CN Bind Password Base DN LDAP Attribute mapping User Property Mappings Group Property Mappings Additional settings Group User path Addition User DN Addition Group DN User object filter Group object filter Group membership field Object uniqueness field

Authentik is an open-source, self-hosted Identity Provider (IdP) and Single Sign-On (SSO) platform designed to secure, manage, and authenticate users across applications. It functions as a flexible alternative to solutions like Okta or Azure AD, supporting protocols such as OAuth2, SAML, LDAP, and SCIM. Key features include multi-factor authentication (MFA), user lifecycle management, and a proxy for securing non-native apps. 

Use the following configuration settings. Make sure you replace “dc=example,dc=com” with the root DN for your OpenLDAP service.

Additional information for setting up Authentik with OpenLDAP may be found here:

https://docs.goauthentik.io/add-secure-apps/providers/ldap

Name

ldap

Slug

ldap

Connection settings

Server URI

ldap://<server fully-qualified-domain-name or IP address>:389

TLS Verification Certificate

---------

Bind CN

The Bind CN item is the distinguished name (DN) of the administrative user you will use to login (authenticate) to the OpenLDAP server for Authentik to do its work. 

uid=admin,ou=people,dc=example,dc=com

Bind Password

The Bind Password is the password for the admin account.

ADMIN_PASSWORD

Base DN

Remember, this must be the base DN for the OpenLDAP directory. It should look something like:

dc=example,dc=com

LDAP Attribute mapping

User Property Mappings

Group Property Mappings

Additional settings

Group

---------

User path

LDAP/users

Addition User DN

ou=people

Addition Group DN

ou=groups

User object filter

(objectClass=person)

Group object filter

(objectClass=groupOfUniqueNames)

Group membership field

member

Object uniqueness field

uid
Copyright © 2020-2024 Symas Corporation. All rights reserved.
secure verified

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Chaining Overlay with Keep Alive Function
  • cn=monitor Reference
  • Common ldap Command Parameters
  • Common slapd Command Parameters
  • Convert Single-Master to Multi-Master Replication
  • Symas Blog RSS Feed
  • Symas on Facebook
  • Symas on Twitter
  • Symas Blog
  • Symas on LinkedIn
  • Symas YouTube Channel

Copyright © 2025, Symas Corporation. All rights reserved. Privacy Statement (updated July 31, 2023)

Phone:

Main Office: +1.650.963.7601
Fax: +1.650.390.6284

Email:

Sales: sales@symas.com
Support: support@symas.com

Office Hours:

8:00 AM - 5:00 PM ET

Office Location:

Symas Corporation
PO Box 391
Grand Junction, CO 81507 USA

Expand