ServiceDesk Plus allows you to use Lightweight Directory Access Protocol (LDAP) to import users from a user directory through the domain controller. LDAP allows users to use their LDAP credentials while logging into ServiceDesk Plus. LDAP authentication supports both Linux and Windows users.
Role Required: SDAdmin
To configure AD related settings in non-ESM setups, go to Admin > Users > LDAP.
To import users and set up LDAP authentication, you must initially configure the Domain Controller for the imported domains.
On the LDAP configuration page, click Add New Domain under Domain Controllers block. Use the following pointers to configure the domain controller:
|
Field Name |
Description |
|
Domain Controller* |
Specify the domain controller of the domain from where the users have to be imported. The domain controller responds to all security-related authentication requests within the related domain.
|
|
Username |
Enter your Active Directory user name along with the Organizational unit (OU) in the given field. Username - distinguishedName of the user
Sample: CN=sdp,DC=domainname,DC=com CN=sdp,OU=UsersOU,DC=domainname,DC=com |
|
Password |
Specify the password used to log in to the Active Directory. |
|
Base DN* |
The Base DN represents the distinguished name of the Base OU. Base DN - distinguishedName of the OU/container. Organizational Units starts with 'OU=' and containers starts with 'CN='
Sample: OU=UsersOU,DC=domainname,DC=com OU=SDPOU,OU=UsersOU,DC=domainname,DC=com CN=Users,DC=domainname,DC=com |
|
Search Filter* |
Specify the criteria to apply to the domain controller in the Search Filter field. For ex: mail=* will import users from the parameter mail in the specified domain controller. |
|
LDAP Server Type* |
If you have chosen the Server type as default LDAP such as Microsoft Active Directory, Novell eDirectory, and OpenLDAP then the following fields will be auto-populated. |
|
If the LDAP Server Type is Others then, specify the Login Attribute Label, Mail Attribute Label, and the Distinguished Name Attributed Label (similar to the Base DN) in the respective fields. |
* Indicates mandatory fields
|
This should be part of the search filter to import only user objects from LDAP servers. Any specific criteria should be added to this.
'mail' is the attribute name in LDAP server and it can be replaced with other attribute names for the same purpose.
Single group:
(&(objectClass=user)(objectCategory=person)(memberOf=CN=Group1,OU=TestOU,DC=manageengine,DC=com))
Multiple groups:
'memberOf=' in the above queries should be followed by DistinguishedName of the group.
Click Save or Save and Import. You can also import users from the existing domain by clicking Import Now on the corresponding Domain Controllers. The existing data will be overwritten on importing the users from the same domain.
After importing users, you can configure authentication and schedule import from the LDAP configurations.

You can edit/delete a domain controller from the Domain Controllers table:
icon. Note that users imported from a deleted domain controller will not be able to login to the application further using LDAP credentials.You can set a default local authentication password for users imported through LDAP. Users can change this password after the first login.
To set a local authentication password from the LDAP configuration page,

Users will be notified about their password in their login emails. You can configure email notifications for users from Admin > Helpdesk Customizer > Notification Rules > Requests > Send Self-Service Login details.
You can schedule LDAP import at regular intervals to keep your user repository in sync with the LDAP server. When you schedule a LDAP import, data from all the configured LDAP servers in the application is imported once every specified number of days. Users and user details from all the domains available in LDAP are synced to ServiceDesk Plus.
The user details from the domains will be imported periodically as per the number of days specified after the start date and time. During consecutive imports in the same domain, the existing data will be overwritten.

You can allow users to log in to ServiceDesk Plus using their LDAP credentials.
In the Login screen, the users can specify their LDAP login credentials and select the Domain to log into ServiceDesk Plus. They can also bypass LDAP authentication during login by selecting Local Authentication from the Domain drop-down and specifying the local credentials.
You can import default user attributes such as the login name, distinguished name, and domain name fields. Other user attributes such as phone, mobile, department, office, jobTitle, and email are mapped to LDAP attributes in the sdldapfieldmap table.
For example, to map the field Emp ID to the employeeID attribute of your directory, such as AD or openLDAP, you'll need to do the following:
Insert a row in the sdldapfieldmap table by executing the following insert query in your database server:
To enable the import of a field that already exists in SDLdapFieldMap but is not currently active, follow these steps:
1. Run the following update query to enable the import:
UPDATE sdldapfieldmap SET import = true WHERE id = <ID of the field>;
2. To find the <ID of the field>, execute the select query below:
SELECT * FROM sdldapfieldmap;
3. From the query results, locate the required field and copy its value from the ID column. Replace <ID of the field> in the update query with this value.
4. After executing the update query, restart the application service for the changes to take effect.
LDAP Field Names are not case-sensitive but ServiceDesk Plus Field Names are. Please ensure that you use field names in the correct case as indicated in the list below.
| Field Names |
|---|
|
phone mobile department office jobTitle employeeid firstName middleName lastName ReportingTo displayname |
To import any more additional fields, such as user defined fields, the SDAdmin or users with database access can map the API Field Name to the corresponding LDAP attributes in the sdldapfieldmap table.
For example, to map the user defined field, Company to the Comapny attribute of your directory, you must insert a row in the sdldapfieldmap table using the following insert query:
Restart the server after executing the queries. Then, import your users from the LDAP server.
A self-signed certificate must be imported to connect LDAPS in secured mode.
Steps to Generate the LDAPS Certificate: