• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
CDP Studio logo

CDP Studio

The no-code and full-code software development tool for distributed control systems and HMI

  • Doc
  • Why CDP
    • Software developers
    • Automation engineers
    • Managers
  • Products
    • Automation Designer
    • HMI Designer
    • Maritime HMIs
  • Services
  • Use cases
  • Pricing
  • Try CDP

CDP Studio Documentation

  • Framework - Security
  • LDAP Authentication Method
  • 5.0.0

Reverse HTTP Proxy Authentication Method Protecting Devices with CDP Studio and UFW

LDAP Authentication Method

LDAP Authentication Method

With this method, the users will be authenticated by an external LDAP server. This method can be used in any CDP application (e.g. Console, GUI or WebUI), to replace or be in parallel with other methods, like the default password-based authentication.

With this method, the user's credentials will be verified using an external LDAP such as OpenLDAP, Microsoft Active Directory or any other LDAP server that supports the LDAP version 3 (or newer) protocol.

To ease up user management, with the LDAP authentication method the user does not have to pre-exist in the CDP Security database. If the user does not exist in the CDP Security database, the user entry will be created after successful LDAP authentication with CDP roles corresponding to the user LDAP groups. In other words, all LDAP users that have the configured LDAP group(s) assigned will be able to log in to the CDP application without the need to create the user or set an initial password for the user in the CDP.

To add the method, select the LDAP from the bottom row Type column and click on the in front of the row or drag the LDAP Authentication resource from the Resource tree to the Authentication Methods table. To edit the method properties, click the navigate button in front of the method name and the editing window opens up.

This method has the following configurable properties:

SettingDescription
ServerHostLDAP server host address
ServerPortLDAP server port. Usual values are 389 when Encryption is set to Unencrypted or StartTLS and 636 when Encryption is set to TLS.
BindDNLDAP user bind DN string. %s will be replaced with the entered username on bind.
TimeoutTimeout to wait for LDAP requests
AutoCreateCDPUserWhen set, the LDAP authenticated user does not have to pre-exist in the CDP Security database - then it will be created after successful LDAP authentication and with CDP roles matched via LDAPGroupRoleMapping-s assigned.
EncryptionLDAP server connection encryption. Options are Unencrypted, TLS, and StartTLS. Should use TLS or StartTLS whenever possible to prevent credential leakage over communication channel with LDAP server.
TLSMinVersionMinimum TLS version that is allowed for LDAP server TLS connection. Options are TLSv1.1, TLSv1.2, and TLSv1.3.
TLSServerCACertFileLDAP server host certificate issuer (CA) file name (for TLS certificate-based broker verification)
TLSClientCertFileOptional LDAP client authentication certificate file name (for TLS client authentication)
TLSClientKeyFileOptional LDAP client authentication key file name (for TLS client authentication)
TLSAllowVerificationErrorsAllow verification errors in the TLS connection
LDAPLogLevelLogging flags of the LDAP backend library, set to -1 to enable all types

The LDAP authentication method also has a list of LDAPGroupRoleMapping elements, which can be added to configure how to map LDAP groups to CDP roles. The LDAPGroupRoleMapping can be added by clicking the in front of the LDAPGroupRoleMapping property or by dragging the LDAPGroupRoleMapping resource from the Resource tree to the LDAP Authentication method editing window.

Note: The LDAPGroupRoleMapping is only used when the user has no roles configured in the CDP Security database. For users who already have roles configured in the CDP Security database, the LDAPGroupRoleMapping is not applied.

For the LDAPGroupRoleMapping, the following properties can be configured:

PropertyDescription
GroupDNLDAP group full DN
RolesSemicolon-separated list of Roles to map to that LDAP group
DisabledCan be used to disable this mapping temporarily
NotesAdmin notes for the mapping

Note: Every user must have at least one role assigned to be able to log in.

Password and LDAP Authentication

When both password and LDAP authentication methods are enabled, the user can log in with either method. The methods are tried in the order they are listed in the Authentication Methods table, from top to bottom.

When you move the Password authentication method to the bottom of the list, the LDAP authentication method will be used first, and password authentication only when there is a problem with LDAP authentication. This way, you make the LDAP authentication method to be the primary authentication method and the password authentication method as a fallback method.

Reverse HTTP Proxy Authentication Method Protecting Devices with CDP Studio and UFW

The content of this document is confidential information not to be published without the consent of CDP Technologies AS.

CDP Technologies AS, www.cdpstudio.com

Get started with CDP Studio today

Let us help you take your great ideas and turn them into the products your customer will love.

Try CDP Studio for free
Why CDP Studio?

CDP Technologies AS
Hundsværgata 8,
P.O. Box 144
6001 Ålesund, Norway

Tel: +47 990 80 900
E-mail: info@cdptech.com

Company

About CDP

Contact us

Services

Partners

Blog

Developers

Get started

User manuals

Support

Document download

Release notes

My account

Follow CDP

  • LinkedIn
  • YouTube
  • GitHub

© Copyright 2025 CDP Technologies. Privacy and cookie policy.

Return to top