Latest version: v2.1.1 Compatible with Fusion version: 5.9.1 and later
The LDAP ACLs V2 connector indexes access control lists (ACLs) from an LDAP directory. It is used by other content connectors to enable security trimming so users can only search and access content they’re authorized to see. The LDAP ACLs V2 connector is useful in environments where content sources such as SharePoint or Google Cloud Storage have ACLs that reference LDAP group or user identities. To enable Fusion to enforce those ACLs at query time, the LDAP ACLs V2 connector first connects to an LDAP directory such as Active Directory, OpenLDAP, or another LDAP-compliant server to ingest user and group membership information. The connector then maps those users and groups to document-level ACLs indexed by other connectors for security trimming.
Verify your connector versionThis connector depends on specific Fusion versions. See the following table for the required versions:
Fusion versionConnector version
Fusion 5.6.1 and laterv1.0.0 and later
Fusion 5.9.0 and laterv1.5.0 and later
Fusion 5.9.1 and laterv2.0.0 and later
For connector downloads, see Download Connectors.
Pod limitThe LDAP ACLs V2 connector does not support running multiple instances. Don’t run the connector on more than one pod.

Prerequisites

Perform these prerequisites to ensure the connector can reliably access, crawl, and index your data. Proper setup helps avoid configuration or permission errors, so use the following guidelines to keep your content available for discovery and search in Fusion. The LDAP server must use a supported authentication method:
  • Simple bind with a username and password.
  • (Optional) Anonymous bind for open LDAP servers, but this is discouraged in production environments for security reasons.
The LDAP access requires a bind DN (Distinguished Name) with permissions to read user and group entries:
  • For users: Have access for uid, cn, sAMAccountName, or an equivalent for the unique user ID.
  • For groups: Have access for cn or equivalent for group ID, plus member, or uniqueMember for users or subgroups assigned to that group.
If you are using Azure AD, the following API permissions are required under Microsoft Graph:
  • User.Read.All to read profile properties and group memberships.
  • GroupMember.Read.All to read memberships and basic group properties.

Remote mode prerequisites (optional)

If running in remote mode, there are additional considerations:
  • Ensure your network allows outbound HTTP/2 traffic from the remote host to the Fusion gRPC endpoint.
  • You need a Fusion user account with the remote-connectors or admin role to authenticate the connector.
  • If the standalone host doesn’t trust Fusion’s TLS cert, point it to your truststore file path.

Authentication

Setting up the correct authentication according to your organization’s data governance policies helps keep sensitive data secure while allowing authorized indexing. You will need to enter the following in Fusion:
  • LDAP host and port.
  • Bind DN username for the Login User Principal field in Fusion.
  • Bind password for the Login Password in Fusion.
  • Base DN, such as dc=example,dc=com.
  • User and group filters are prepopulated and you can adjust these as needed.
  • If crawling Azure AD, enter the Azure credentials in the Azure AD Properties section.
Once all necessary fields are entered, save your connector configuration and click Test Connection in the Fusion UI to verify authentication. If successful, the connector will be able to do the following:
  • Bind to the LDAP server.
  • Search users and groups.
  • Fetch ACL data for security trimming.

Full recrawls

Starting in Fusion 5.7, subsequent crawls work differently with the LDAP ACLs V2 connector than other connectors. Crawls follow this process:
  1. Every time the connector crawl runs, all documents are indexed.
  2. Each document is assigned a new field, _lw_job_id_s.
  3. The connector job assigns the jobID value to this field.
  4. When the crawl finishes, the job deletes documents that do not have the latest jobID value.

Remote connectors

You can configure the LDAP ACLs V2 connector (v2.0.0 and later) to running remotely in Fusion versions 5.9.1 and later.

Security trimming

Starting in Fusion 5.9, you can configure the LDAP ACLs V2 connector with the SharePoint Optimized V2 connector to support security trimming.

Configuration

When entering configuration values in the UI, use unescaped characters, such as \t for the tab character. When entering configuration values in the API, use escaped characters, such as \\t for the tab character.