KNOWLEDGE BASE ARTICLE

Configuring Umango for Active Directory (LDAP) Lookups

Enable LDAP-backed merge fields like {{LDAP(mail)}} and {{LDAP(displayName)}} in your Umango jobs.

Overview

Umango can look up user data from Active Directory or any LDAP-compatible directory using the LDAP merge method. Configure the following in the Advanced Configuration dashboard:

  • ldap.path
  • ldap.username
  • ldap.password
  • ldap.dn

1) ldap.path

Directory server endpoint used for lookups.

Examples
LDAP: LDAP://yourdomain.com
LDAPS: LDAPS://yourdomain.com
With port: LDAPS://yourdomain.com:636

If not set, Umango uses the Windows domain of the host to form a default path like LDAP://<YourDomain>.

2) ldap.username

Optional service account used for directory bind. Leave blank to use the current Windows service identity.

  • UPN: service.account@yourdomain.com
  • Domain\SAM: YOURDOMAIN\service.account

Requires read access to target OUs.

3) ldap.password

Password for ldap.username. Ignored if username is blank (i.e., binding with the current Windows identity).

4) ldap.dn

Base DN to scope searches. Examples:

DC=yourdomain,DC=com
OU=Users,DC=yourdomain,DC=com

If omitted, Umango inspects RootDSE to pick a sensible default. You can set a narrower OU for performance/security.

How it works at runtime

  1. Umango reads the LDAP settings from tenant configuration.
  2. It binds to the directory (AD Negotiate with signing/sealing, or LDAP Basic/StartTLS as required).
  3. It decides on a base DN from ldap.dn or RootDSE.
  4. It searches for the user (e.g., via sAMAccountName, userPrincipalName, cn, uid, mail) and returns the requested attribute.

Failures are logged with helpful messages (bind errors, invalid DN, StartTLS required).

Using LDAP merge fields (correct syntax)

Merge Field Description
{{LDAP(mail)}} Email address of the batch owner
{{LDAP(mail,steve.p)}} Email address of user steve.p
{{LDAP(displayName)}} User display name
{{LDAP(department)}} Department
{{LDAP(telephoneNumber)}} Telephone number
{{LDAP(title)}} Job title
{{LDAP(manager)}} Manager DN

See the full guide for more attributes and usage patterns: Umango LDAP Merge Method Guide

Troubleshooting

Connectivity
  • DNS resolves your LDAP host
  • Firewall allows 389/636 as needed
  • Certificates trusted for LDAPS
Configuration
  • Correct ldap.username / ldap.password
  • Valid ldap.dn (test with ldp.exe)
  • Use LDAPS:// where possible

Check Umango logs for messages like "LDAP bind failed", "Invalid base DN", or "StartTLS required".

Note About Azure Entra

When using Azure Entra for Umango authentication, similar lookups can be performed using the Entra() merge method. See the help guide: Umango Entra Merge Method Guide

Link to this article https://umango.com/KB?article=152