Okta LDAP Interface
Audience: Application Admins
Content Summary: This page explains what the Okta LDAP Interface is and the set up process.
Okta LDAP Interface is a built-in Okta integration that enables you to expose your Okta directory over standard LDAP wire. The Okta LDAP Interface exposes the entire Okta directory.
The LDAP interface is not an isolated application
This means that you cannot manage the assignment of users and groups to the LDAP Interface the same way you would in a web application. Instead, you should be able to leverage LDAP filters to moderate access to applications that call the LDAP Interface (i.e., filtering user attributes and groups.)
1 - Enable LDAP Interface in Your Okta Account
Go to the Admin Console in your Okta account.
Select Directory, and then click Directory Integrations.
Select Add Directory and Add LDAP Interface. You will be presented with the details required to make a successful LDAP connection.
Best Practice: Create a Service Account
Create a service account to use as your LDAP bind user; any Okta admin with the "view users" permission can serve the role. Choose the Read-Only Admin to grant the least privilege.
2 - Set Up Authentication with the LDAP Interface in Immuta
Navigate to the App Settings page in Immuta.
Click the Add IAM button.
Complete the Display Name field and select your IAM type from the Identity Provider Type dropdown: LDAP/Active Directory, SAML, or OpenID.
For a tutorial on setting up an Okta IAM see the App Settings page.
3 - Configure MFA in Okta
To enforce directory-wide MFA, create an authentication policy in Okta (if you do not yet have MFA policies in place).
- Navigate to Security in the Okta Admin console.
Select Authentication, and then click Sign On.
Note: If you enforce MFA on the user that’s configured as your LDAP bind user, the integration won’t work. You will therefore need to make that user exempt in your MFA policies.