Skip to main content
Altcraft Docs LogoAltcraft Docs Logo
User guideDeveloper guideAdmin guide
Company siteHelp center
English
  • Русский
  • English
Login
  • Getting Started
  • Administrator documentation
  • Functional characteristics
  • Technology description
  • System requirements
  • Admin Panel
  • Platform installation
  • Platform configuration
    • Configuration file
    • Domain settings
    • LDAP access configuration
    • Sending Email via SMTP relay
    • Pixel and push domain configuration
    • Cluster and Replication Setup
    • System notifications configuration
    • Processes UNIX sockets configuration
    • HTTPS Configuration
    • Adding sender IP addresses
    • Deduplication request settings
    • PostgreSQL database for account data
    • Proxy server settings
    • Keycloak Integration with Altcraft
    • Getting HTTP service statuses
    • Configuration MongoDB logs rotation
    • Configuration of system constants and directories
  • Platform maintenance
  • Custom channels guide
  • Extra
  • Processing HTTP/HTTPS traffic
  • Administrator API
  • Documentation Archive
  • Platform configuration
  • LDAP access configuration

LDAP access configuration

Overview​

You can configure LDAP access to your Altcraft MP account and Administrative panel. This allows your employees to use company's directory service like Active Directory to log into the platform with a predefined set of access groups and roles.

LDAP can be used for both Administrative panel and for account User interface.

A DistinguishedName for a group of users includes nested groups of directory service hierarchy.

LDAP access to Administrative panel​

LDAP access to platform Administrative panel is configured in MarketingPlatform/config/main.json configuration file:

"LDAP": {
"LDAP_ONLY": false,
"PRIMARY_HOST": "ldap.primary.example.com",
"PRIMARY_PORT": 389,
"SECONDARY_HOST": "ldap.secondary.example.com",
"SECONDARY_PORT": 389,
"BINDLOGIN": "cn=admin,dc=example,dc=com",
"BINDPASS": "your_password",
"BASE_DN": "dc=example,dc=com",
"AUTH_GROUP": "CN=AdminGroup,CN=Users,DC=example,DC=com",
"IS_SSL": false,
"START_TLS": false,
"CRT_PATH": "/etc/ssl/certs/ldap_client.crt",
"CA_CRT_PATH": "/etc/ssl/certs/ca.crt",
"KEY_PATH": "/etc/ssl/private/ldap_client.key"
},
"LDAP_CHECK_USER_TIME_PERIOD_SEC": 300
ParameterTypeDescription
Main parameters
LDAP_ONLYboolProhibits access to the admin panel using login/password created within the platform. All authentication requests are directed to the LDAP server.
PRIMARY_HOSTstringNetwork address of the primary LDAP server.
PRIMARY_PORTintPort of the primary LDAP server (usually 389 for LDAP, 636 for LDAPS).
SECONDARY_HOSTstringNetwork address of the backup LDAP server for fault tolerance.
SECONDARY_PORTintPort of the backup LDAP server.
BINDLOGINstringLogin of the account for connecting to the LDAP server (e.g., cn=admin,dc=example,dc=com).
BINDPASSstringPassword of the account for connecting to the LDAP server.
BASE_DNstringThe base DN (Distinguished Name) from which the directory search begins.
AUTH_GROUPstringThe distinguished name of the LDAP access group that determines employee access to the admin panel.
Secure connection parameters
IS_SSLboolEnables LDAPS mode (LDAP over SSL). The connection is encrypted from the start on a separate port (usually 636).
START_TLSboolEnables the STARTTLS extension. Encryption is established on top of the regular connection on the standard LDAP port (389) after executing a special command.
CRT_PATHstringPath to the client certificate file (if mutual authentication is required).
CA_CRT_PATHstringPath to the Certificate Authority (CA) certificate file.
KEY_PATHstringPath to the client's private key file.
Additional parameters
LDAP_CHECK_USER_TIME_PERIOD_SECintTime interval (in seconds) for checking the compliance of user rights with the granted access. Set outside the LDAP object. Default: 300.
info
  • The account for connecting to the server (BINDLOGIN/BINDPASS) must have sufficient rights to read the attributes of the group specified in AUTH_GROUP.
  • The IS_SSL and START_TLS parameters are mutually exclusive — only one encryption mode can be enabled at a time. More information about the STARTTLS mechanism can be found in this article.

After making changes to the main.json configuration file, restart Altcraft MP (./akd restart).

LDAP User interface access​

LDAP access to account User interface is set up for every account separately in Altcraft Administrative panel.

LDAP binding creation​

Enter Altcraft MP Administrative panel and open Create —> LDAP binding or Setup —> LDAP binding and press Create.

Specify LDAP connector name, directory server network address and port. Enter Username and Password for directory server database access. If you are planning to use a secure connection activate Use SSL option and set up directory service SSL certificates.

caution

Directory service connection account must have sufficient access rights to the groups that will be used for platform authorisation.

Setting up account LDAP access​

Open an existing account settings or create a new account. Activate Use LDAP option to get access to the settings:

note

LDAP only option restricts Altcraft login and password authorisations. All requests will be processed via LDAP to directory service.

Time interval between checking user DistinguishedName and access rights matching is configured in main.json configuration file in LDAP_CHECK_USER_TIME_PERIOD_SEC property with an integer value. By default — 300 seconds.

In a dropdown select an Assigned LDAP connector: LDAP binding, you are going to use for this account access.

Basic access settings​

For configuring basic account access you will need directory service DistinguishedNames for the following groups:

  • Auth Group — allows platform access with a default set of user groups and roles.
  • Master Group — allows master access to account settings, main group containing all account objects and to objects outside groups.

Both LDAP groups are required for a user to have master access.

Specify these groups DistinguishedNames in the corresponding fields. As DN examples the following are used: CN — common name, OU — organisation unit and DC — domain component.

Select or create Default Groupsand Default Roles to be accessible by default for all users with Authorized group DistinguishedName.

note

WARNING! Users with no assigned groups or roles cannot log into account.

In case a user role allows to interact with a certain group make sure the corresponding group is assigned to the user as well. Otherwise no access to the group will be permitted.

Access differentiation​

You can create directory service DistinguishedNames matching custom Altcraft MP groups and roles.

Enter the DistinguishedNames into these fields:

  • Groups matching — to set access groups matching.
  • Roles matching — to set access roles matching.

GroupsNusers.png

Authorizing with LDAP​

To enter Administrative panel use LDAP username and password.

To enter account interface use LDAP username with account alias: ldapuser@domain.com@account1, and LDAP password.

If LDAP only option is disabled, both Altcraft MP and LDAP login credentials can be used.

Last updated on Mar 12, 2026
Previous
Domain settings
Next
Sending Email via SMTP relay
  • Overview
  • LDAP access to Administrative panel
  • LDAP User interface access
    • LDAP binding creation
    • Setting up account LDAP access
      • Basic access settings
      • Access differentiation
  • Authorizing with LDAP
© 2015 - 2026 Altcraft, LLC. All rights reserved.