This is documentation for the next version of Grafana. For the latest stable release, go to the latest version.
Configure enhanced LDAP integration
The enhanced LDAP integration adds additional functionality on top of the LDAP integration available in the open source edition of Grafana.
Note: Available in Grafana Enterprise and Grafana Cloud. If you are a Grafana Cloud customer, please open a support ticket in the Cloud Portal to request this feature.
To control user access with role-based permissions, refer to role-based access control.
LDAP group synchronization
With enhanced LDAP integration, you can set up synchronization between LDAP groups and Grafana teams and roles. This enables users that are members of certain LDAP groups to automatically be added to teams and gain roles in Grafana.
The below example shows an LDAP group member mapped to a Grafana team.
To learn more about group synchronization, refer to Configure team sync and Configure group attribute sync.
Active LDAP synchronization
In the open source version of Grafana, user data from LDAP is synchronized only during the login process when authenticating using LDAP.
With active LDAP synchronization, you can configure Grafana to actively sync users with LDAP servers in the background. Only users that have logged into Grafana at least once are synchronized.
Users with updated role and team membership will need to refresh the page to get access to the new features.
Removed users are automatically logged out and their account disabled. These accounts are displayed in the Server Admin > Users page with a disabled
label. Disabled users keep their custom permissions on dashboards, folders, and data sources, so if you add them back in your LDAP database, they have access to the application with the same custom permissions as before.
[auth.ldap]
...
# You can use the Cron syntax or several predefined schedulers -
# @yearly (or @annually) | Run once a year, midnight, Jan. 1st | 0 0 1 1 *
# @monthly | Run once a month, midnight, first of month | 0 0 1 * *
# @weekly | Run once a week, midnight between Sat/Sun | 0 0 * * 0
# @daily (or @midnight) | Run once a day, midnight | 0 0 * * *
# @hourly | Run once an hour, beginning of hour | 0 * * * *
sync_cron = "0 1 * * *" # This is default value (At 1 am every day)
# This cron expression format uses 5 space-separated fields, for example
# sync_cron = "*/10 * * * *"
# This will run the LDAP Synchronization every 10th minute, which is also the minimal interval between the Grafana sync times i.e. you cannot set it for every 9th minute
# You can also disable active LDAP synchronization
active_sync_enabled = true # enabled by default
Single bind configuration (as in the Single bind example) is not supported with active LDAP synchronization because Grafana needs user information to perform LDAP searches.
For the synchronization to work, the servers.search_filter
and servers.attributes.username
in the ldap.toml config file must match. By default, the servers.attributes.username
is cn
, so if you use another attribute as the search filter, you must also update the username attribute.
For example:
[[servers]]
search_filter = "(sAMAccountName=%s)"
[servers.attributes]
username = "sAMAccountName"
If the attributes aren’t the same, the users’ sessions will be terminated after each synchronization. That’s because the search will be done using the username’s value, and that value doesn’t exist for the attribute used in the search filter.