LDAP
2 minute read.
Last Modified 2022-12-06 16:56 -0500Click Configure LDAP in Credentials > Directory Services to open the LDAP form.

| Setting | Description |
|---|---|
| Hostname | LDAP server hostnames/IP addresses. Separate entries with Space. You can enter multiple hostnames/IP addresses to create an LDAP failover priority list. If a host does not respond, TrueNAS will try the next host until it establishes a connection. |
| Base DN | Top level of the LDAP directory tree to be used when searching for resources. Example: dc=test,dc=org. |
| Bind DN | Administrative account name on the LDAP server. Example: cn=Manager,dc=test,dc=org. |
| Bind Password | Password for the Bind DN. |
| Enable | Activates the configuration. Unset to disable the configuration without deleting it. You can re-enable it later without reconfiguring it. |
| Setting | Description |
|---|---|
| Allow Anonymous Binding | Set for the LDAP server to disable authentication and allow read and write access to any client. |
| Encryption Mode | Options for encrypting the LDAP connection: OFF: do not encrypt the LDAP connection. ON: encrypt the LDAP connection with SSL on port 636. START_TLS: encrypt the LDAP connection with STARTTLS on the default LDAP port 389. |
| Certificate | Certificate to use when performing LDAP certificate-based authentication. To configure LDAP certificate-based authentication, create a Certificate Signing Request for the LDAP provider to sign. TrueNAS does not need a certificate when using username/password or Kerberos authentication. To configure LDAP certificate-based authentication, create a Certificate Signing Request for the LDAP provider to sign. |
| Validate Certificates | Verify certificate authenticity. |
| Disable LDAP User/Group Cache | Disable caching LDAP users and groups in large LDAP environments. When caching is disabled, LDAP users and groups do not appear in drop-down menus but are still accepted when manually entered. |
| Kerberos Realm | Select an existing realm from Kerberos Realms. |
| Kerberos Principal | Select the location of the principal in the keytab created in Kerberos Keytab. |
| LDAP Timeout | LDAP timeout in seconds. Increase this value if a Kerberos ticket timeout occurs. |
| DNS Timeout | DNS timeout in seconds. Increase this value if DNS queries timeout. |
| Samba Schema (DEPRECATED - see help text) | Only set if you configured the LDAP server with Samba attributes and it requires LDAP authentication for SMB shares. |
| Auxiliary Parameters | You can specify additional options for nslcd.conf. |
| Schema | Schema to use with Samba Schema. |
DEPRECATED: Samba Schema support is deprecated in Samba 4.13. We will remove this feature after Samba 4.14. Users should begin upgrading legacy Samba domains to Samba AD domains.