Centralized authentication through LDAP lets you manage Niagara user accounts from Active Directory instead of maintaining separate credentials on every station. This eliminates password sprawl and simplifies user onboarding and offboarding.
| Requirement | Details |
|---|---|
| Niagara version | 4.6 or later |
| License | LDAP module included in station license |
| Network | Station must reach domain controller on port 389 (LDAP) or 636 (LDAPS) |
| AD service account | Read-only account for directory queries |
| TLS certificate | Required for LDAPS (strongly recommended) |
User Browser → Niagara Station → LDAP Query → Active Directory
↓ ↓
Local Auth (fallback) AD Groups → Niagara Roles
ldap module if not already presentOpen the LdapUserService properties:
LDAP Configuration:
Server URL: ldaps://dc01.company.com:636
Base DN: DC=company,DC=com
Bind DN: CN=NiagaraSvc,OU=Service Accounts,DC=company,DC=com
Bind Password: ********
User Search Filter: (&(objectClass=user)(sAMAccountName={0}))
Search Subtree: true
Connection Timeout: 5000 ms
Read Timeout: 10000 ms
| Protocol | Port | Security | Recommendation |
|---|---|---|---|
ldap:// | 389 | None | Development only |
ldaps:// | 636 | SSL/TLS | Production use |
ldap:// + StartTLS | 389 | TLS upgrade | Alternative to LDAPS |
For LDAPS connections, the station must trust the AD certificate:
Workbench > Platform > Trust Store Manager
→ Import Certificate
→ Select the AD CA certificate
→ Restart station
Map Active Directory groups to Niagara roles:
Group Mappings:
CN=BAS-Admins,OU=Groups,DC=company,DC=com → admin
CN=BAS-Operators,OU=Groups,DC=company,DC=com → operator
CN=BAS-Viewers,OU=Groups,DC=company,DC=com → viewer
| AD Group | Niagara Role | Access Level |
|---|---|---|
| BAS-Admins | admin | Full configuration access |
| BAS-Operators | operator | Read + command, no config |
| BAS-Viewers | viewer | Read-only monitoring |
Configure the station to try LDAP first, then fall back to local:
Authentication Order:
1. LdapUserService (primary)
2. UserService (fallback)
Keep at least one local admin account as a fallback in case the domain controller is unreachable.
LDAP credentials travel over the network, so enforce HTTPS:
true| Symptom | Cause | Fix |
|---|---|---|
| "LDAP error code 49" | Invalid credentials | Verify bind DN and password |
| "Connection refused" | Wrong port or firewall | Check port 636 is open |
| "Certificate not trusted" | Missing CA cert | Import AD CA into trust store |
| "Timeout" | DNS or routing issue | Verify station can ping DC |
If the AD service account password expires, all LDAP authentication fails:
sAMAccountName is correct (some environments use userPrincipalName)Proper LDAP integration means one less password for technicians to remember and one less account for IT to manage when someone leaves the organization.