Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Now Platform administration
Table of Contents
Choose your release version
    Home Paris Now Platform Administration Now Platform administration User administration Authentication LDAP integration LDAP integration setup

    LDAP integration setup

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    LDAP integration setup

    Administrators can enable LDAP integration to allow sign-on of users from their company LDAP directory.

    LDAP typically uses one of these types of communication channels.

    Table 1. LDAP communication channels
    Connection Description LDAP import support? LDAP authentication support?
    MID Server connection Communicates over HTTP on port 80 by default. This communication channel does not require a certificate. The connection between the MID Server and the instance is over HTTPS (port 443). You can use the MID Server to import data over LDAP, but you cannot use the MID Server for LDAP authentication. Proceed to Define the LDAP Server. Yes No
    Standard LDAP integration Communicates over TCP on port 389 by default. This communication channel does not require a certificate. Proceed to Define the LDAP Server. Yes Yes
    SSL-encrypted LDAP integration (LDAPS) Communicates over TCP on port 636 by default, This communication channel requires a certificate. Proceed to Install the LDAP X.509 SSL certificate to obtain and upload the certificate. Yes Yes
    VPN connection Communicates over an IPSEC tunnel. Purchase or create an IPSEC tunnel on your local network. Proceed to Define the LDAP Server. Yes Yes
    If using a MID Server, the MID Server connects to the instance and the MID Server also connects to the LDAP server. In both cases, the MID Server initiates the connection:
    1. First, the MID Server connects to the LDAP server via LDAP on Port 389.
    2. Then, the MID Server initiates an HTTPS encrypted connection to the instance on Port 443 to push the data to the instance.

    For more information about VPNs, Mid Servers, and LDAP, see You Don't Need A VPN Part II on the community.

    • Install the LDAP X.509 SSL certificate

      You can install an X.509 certificate for your LDAP integration.

    • Define an LDAP server

      Create a new LDAP server record in the instance.

    • Enable an LDAP listener and set system properties

      Enabling a listener is optional. If enabled, a listener notifies the system to process LDAP records soon after there is an update on the LDAP server.

    • Specify LDAP attributes

      Specify the attributes included in LDAP server queries using the LDAP server Attributes field. This can enhance performance as well as security.

    • Test an LDAP connection

      The instance tests the connection automatically every time a user opens the LDAP Server form. Alternatively, you can manually test the connection to the LDAP server from the LDAP server form.

    • Define LDAP organizational units

      An organizational unit (OU) definition specifies the LDAP source directories available to the integration.

    • Create a data source for LDAP

      Each LDAP organizational unit (OU) definition has its own related list of data sources.

    • Auto provision LDAP users

      You automatically provision users who are in the LDAP server but not yet in your instance.

    • LDAP integration via MID Server

      Administrators can integrate using an LDAP data source over a Management, Instrumentation, and Discovery (MID) Server.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      LDAP integration setup

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      LDAP integration setup

      Administrators can enable LDAP integration to allow sign-on of users from their company LDAP directory.

      LDAP typically uses one of these types of communication channels.

      Table 1. LDAP communication channels
      Connection Description LDAP import support? LDAP authentication support?
      MID Server connection Communicates over HTTP on port 80 by default. This communication channel does not require a certificate. The connection between the MID Server and the instance is over HTTPS (port 443). You can use the MID Server to import data over LDAP, but you cannot use the MID Server for LDAP authentication. Proceed to Define the LDAP Server. Yes No
      Standard LDAP integration Communicates over TCP on port 389 by default. This communication channel does not require a certificate. Proceed to Define the LDAP Server. Yes Yes
      SSL-encrypted LDAP integration (LDAPS) Communicates over TCP on port 636 by default, This communication channel requires a certificate. Proceed to Install the LDAP X.509 SSL certificate to obtain and upload the certificate. Yes Yes
      VPN connection Communicates over an IPSEC tunnel. Purchase or create an IPSEC tunnel on your local network. Proceed to Define the LDAP Server. Yes Yes
      If using a MID Server, the MID Server connects to the instance and the MID Server also connects to the LDAP server. In both cases, the MID Server initiates the connection:
      1. First, the MID Server connects to the LDAP server via LDAP on Port 389.
      2. Then, the MID Server initiates an HTTPS encrypted connection to the instance on Port 443 to push the data to the instance.

      For more information about VPNs, Mid Servers, and LDAP, see You Don't Need A VPN Part II on the community.

      • Install the LDAP X.509 SSL certificate

        You can install an X.509 certificate for your LDAP integration.

      • Define an LDAP server

        Create a new LDAP server record in the instance.

      • Enable an LDAP listener and set system properties

        Enabling a listener is optional. If enabled, a listener notifies the system to process LDAP records soon after there is an update on the LDAP server.

      • Specify LDAP attributes

        Specify the attributes included in LDAP server queries using the LDAP server Attributes field. This can enhance performance as well as security.

      • Test an LDAP connection

        The instance tests the connection automatically every time a user opens the LDAP Server form. Alternatively, you can manually test the connection to the LDAP server from the LDAP server form.

      • Define LDAP organizational units

        An organizational unit (OU) definition specifies the LDAP source directories available to the integration.

      • Create a data source for LDAP

        Each LDAP organizational unit (OU) definition has its own related list of data sources.

      • Auto provision LDAP users

        You automatically provision users who are in the LDAP server but not yet in your instance.

      • LDAP integration via MID Server

        Administrators can integrate using an LDAP data source over a Management, Instrumentation, and Discovery (MID) Server.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login