Skip to main content

LDAP / Active Directory

This guide configures authentication against LDAP (typically Microsoft Active Directory on-premise) so that Mawidabp users authenticate with their corporate credentials. Appropriate for on-premise installations or when the customer does not use cloud identity.

If you are using Microsoft Entra ID (the cloud version), see Microsoft Entra ID instead of this guide.

When to use LDAP

  • On-premise infrastructure with classic AD.
  • Organizations without Microsoft cloud presence.
  • A requirement that authentication does not leave the corporate network.

Prerequisites

  • Administrator access to Active Directory (or generic LDAP).
  • Credentials of a user with read permission on the directory (bind user).
  • Root certificate (CA) of the LDAP server if the connection uses TLS.
  • Administrator in Mawidabp.

Part 1 — Configuration in Active Directory

Create the groups that will correspond to Mawidabp profiles. Common convention:

GroupMawidabp profile
MawidabpAIGerenteAudit manager
MawidabpAISupervisorSupervisor
MawidabpAISeniorSenior auditor
MawidabpAIAuditorAuditor
MawidabpPAIUser administration
CompanyAuditee (all auditable employees)

Assign users to the groups as appropriate. Group membership is what determines which profile they will have in Mawidabp.

Part 2 — Configuration in Mawidabp

1. Create profiles

  1. Administration → Security → Profiles and privileges → New.
  2. Fill in:
    • Profile: descriptive name; preferably matching the AD group name.
    • Profile type: whatever applies.
    • Identifier: the exact name of the AD group.
  3. Tick the privileges per module.

Repeat for each AD group.

2. Edit the organization

  1. Administration → Organization → Management → Edit the organization.
  2. In the LDAP configuration section, fill in:
FieldDescription
Server addressLDAP server FQDN or IP (for example, ldap.company.local).
Port389 for LDAP, 636 for LDAPS.
TLS versionMinimum TLS version supported (for example, TLSv1.2).
CA pathPath on the Mawidabp server where the LDAP root certificate lives.
Base distinguished nameBase DN to search users from, for example dc=company,dc=local.
FilterLDAP filter to restrict the search (for example, (objectClass=user)).
Authentication maskPattern used to build the DN at authentication time. For example cn={0},ou=users,dc=company,dc=local.
Organizational unit (OU)OU where users live.
Username attributeTypically sAMAccountName in AD.
First name attributeTypically givenName.
Last name attributeTypically sn.
Email attributeTypically mail.
Profiles attributeTypically memberOf.
Default organizational unitOU to assign if a user does not have one defined.
UserBind user for authenticating to LDAP.
PasswordBind user's password.
  1. Update organization. If the screen returns to the initial listing, the configuration was saved successfully.

Test sign-in

  1. Sign out of Mawidabp.
  2. Authenticate with the credentials of an AD user that belongs to one of the configured groups.
  3. The sign-in should pass without asking you to create the user in Mawidabp; the profile is applied automatically based on the group.

Common problems

Sign-in does not progress: check the Mawidabp log; LDAP connection errors (closed port, invalid CA, wrong bind credentials) show up there.

The user signs in but has no permissions: verify the user is in one of the configured groups and that the profiles attribute is returning the correct group name.

TLS fails with untrusted certificate: the root certificate at CA path must be the full chain in a format OpenSSL understands (PEM).

Bulk import

When you want to pre-load users into Mawidabp from LDAP without waiting for each one to sign in:

  1. Enable the "Show 'Import from LDAP' only to users with approval permission" parameter in Parameters if you want to restrict who can do it.
  2. Administration → Security → Users → Import from LDAP.

The import reads the LDAP group and creates/updates users in Mawidabp with their assigned profiles.

Support

If the configuration does not start, write to soporte@mawidabp.com with the error detail and the log.