Enable LDAP-backed merge fields like {{LDAP(mail)}} and {{LDAP(displayName)}} in your Umango jobs.
Umango can look up user data from Active Directory or any LDAP-compatible directory using the LDAP merge method. Configure the following in the Advanced Configuration dashboard:
ldap.pathldap.usernameldap.passwordldap.dnldap.pathDirectory server endpoint used for lookups.
LDAP://yourdomain.comLDAPS://yourdomain.comLDAPS://yourdomain.com:636
If not set, Umango uses the Windows domain of the host to form a default path like LDAP://<YourDomain>.
ldap.usernameOptional service account used for directory bind. Leave blank to use the current Windows service identity.
service.account@yourdomain.comYOURDOMAIN\service.accountRequires read access to target OUs.
ldap.passwordPassword for ldap.username. Ignored if username is blank (i.e., binding with the current Windows identity).
ldap.dnBase DN to scope searches. Examples:
If omitted, Umango inspects RootDSE to pick a sensible default. You can set a narrower OU for performance/security.
ldap.dn or RootDSE.sAMAccountName, userPrincipalName, cn, uid, mail) and returns the requested attribute.Failures are logged with helpful messages (bind errors, invalid DN, StartTLS required).
See the full guide for more attributes and usage patterns: Umango LDAP Merge Method Guide
ldap.username / ldap.passwordldap.dn (test with ldp.exe)LDAPS:// where possibleCheck Umango logs for messages like "LDAP bind failed", "Invalid base DN", or "StartTLS required".
When using Azure Entra for Umango authentication, similar lookups can be performed using the Entra() merge method. See the help guide: Umango Entra Merge Method Guide
Link to this article https://umango.com/KB?article=152