Skip to main content
All CollectionsIntegrationsIdentity Providers
Integrate with Active Directory
Integrate with Active Directory
Updated over a month ago

The Active Directory connector allows IT teams to seamlessly integrate AD functionalities into your Multiplier workflows.

Install and configure Active Directory

To install Active Directory, perform the following actions:

  1. Navigate to the Windows Server Manager.

  2. Click Add Roles and Features.

  1. It will open Add Roles and Features wizard. Click Next.

  2. Select the server from the server pool and click Next.

  1. Click Checkbox to select Active Directory Domain Services.

  2. On the popup Window, just click Add Features.

  3. On the window for selecting features, just click Next.

  4. On the description window, just click Next.

  1. On the confirm installation selections window, click Install.

  1. When the installation finishes, click Close.

  1. After installing AD DS Role, you can promote this Server to a Domain Controller.

  2. Select Add a new forest and give the Root domain name. For this example we'll be using hq.multiplier.com. Then click Next.

  1. Enter the Directory Services Restore Mode password.

  2. Ignore the warning message and click Next.

  1. Use the default NetBIOS domain name and click Next.

  2. Use the default paths and click Next.

  1. Review and click Next if no errors.

  1. Wait for the prerequisites to pass and click Install.

  1. Wait for the installation to finish. Then click Close.

Configure administrator user

  1. Go to the Active Directory Administrative Center, select your server and then click users.

  1. Look for the Administrator user and click on it.

  2. Set the User UPN logon. In this case we are using [email protected]. This is the UPN logon you will be using when configuring the AD integration.

Setup in Multiplier

In order to connect Multiplier with your Active Directory server, you will need to configure the following settings:

  • LDAP Server URL: The URL for accessing the LDAP server, which can be specified using either an IP address or a regular domain address, such as ldaps://192.168.56.101 or ldap://my.domain.com. To establish an SSL-secured connection, however, you’ll need to connect using the domain address and use https://.

  • Server Domain: The fully qualified domain name (FQDN) representing the LDAP domain, like my.domain.com. This domain is essential for secure, SSL-enabled connections. To get the current server domain, you can follow the procedure:

    1. In the Active Directory Administrative Center, right-click on your server and select Properties.

    2. Copy the current domain name. Use this value when setting the integration.

  • Base DN (Distinguished Name): The starting point in the LDAP hierarchy, usually specified as dc=example,dc=com, narrowing the scope for LDAP queries. You can construct the Base DN from the server domain by prepending dc= to each portion of the domain, and joining with commas.

    Example: Given the domain hq.multiplier.com, the base DN becomes dc=hq,dc=multiplier,dc=com

  • LDAP Login for Admin User (UPNLogon): The user’s UPN (User Principal Name), such as [email protected], used to authenticate and grant access to the directory.

  • LDAP Password for Admin User: The password for the UPN, which enables secure directory access when paired with the UPN. If using the default administrator user, this password will be the one used to login to Windows server.

  • LDAP SSL Certificate: This certificate is required for encrypted connections, verifying the LDAP server’s identity and securing data exchanges.

The AD connector doesn't require a SSL certificate to function, but it's recommended you setup a certificate to use in order for the connection to be secure.

Did this answer your question?