Redis Enterprise Software (RS) can integrate with your identity provider using LDAP authentication. After you configure the LDAP connection, you can give LDAP users access to the RS web UI according to the permissions that you assign.

saslauthd is the process that handles LDAP authentication requests to RS.

Note -
LDAP authentication is not yet supported for Redis ACL Users.

To configure LDAP authentication for RS web UI users on a running cluster:

  1. Configure saslauthd to use LDAP Authentication:

    1. Edit the /etc/default/saslauthd, and change the MECHANISMS variable to MECHANISMS="ldap".

    2. Edit the saslauthd.conf configuration file in the installation directory (default: /etc/opt/redislabs/saslauthd.conf) and enter the values for these fields:

      • ldap_servers: the LDAP servers that you authenticate against and the port to use. Port 389 is standard for unencrypted LDAP connections, while port 636 is standard for encrypted LDAP connections (strongly recommended).
      • ldap_tls_cacert_file (optional): The path to your CA Certificates. This is required for encrypted LDAP connections only.
      • ldap_filter: The filter used to search for users
      • ldap_bind_dn: The distinguished name for the user that will be used to authenticate to the LDAP server
      • ldap_password: The password used for the user specified in ldap_bind_dn

      For example:

      ldap_servers: ldaps:// ldaps://
      ldap_tls_cacert_file: /path/to/your/CARootCert.crt
      ldap_search_base: ou=coolUsers,dc=company,dc=com
      ldap_filter: (sAMAccountName=%u)
      ldap_bind_dn: cn=admin,dc=company,dc=com
      ldap_password: secretSquirrel
  2. Import the saslauthd configuration into RS with the command:

    rladmin cluster config saslauthd_ldap_conf /etc/opt/redislabs/saslauthd.conf
  3. Restart the saslauthd service for the changes to take effect: sudo supervisorctl restart saslauthd

  4. Create LDAP users as external users in the RS web UI.