Added certificate section to LDAP Auth method documentation. (#30318)

* a

* Update website/content/docs/auth/ldap.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
This commit is contained in:
gerardma77 2025-07-15 02:00:44 +02:00 committed by GitHub
parent 41e214bc4a
commit 5834655f6d
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -150,6 +150,14 @@ For anonymous search, `discoverdn` must be set to `true`, and `deny_null_bind` m
LDAP users log in using `sAMAccountName` or `userPrincipalName` when the
`upndomain` parameter is set.
### Certificates
At startup, Vault can read LDAP certificates from the operating systems (OS)
certificate trust store instead of reading CA certificates from the
certificate parameter. After startup, you need to restart Vault to read in
new certificates before the LDAP plugin can use the information to establish new
LDAP connections to the configured server address.
### Group membership resolution
Once a user has been authenticated, the LDAP auth method must know how to resolve which groups the user is a member of. The configuration for this can vary depending on your LDAP server and your directory schema. There are two main strategies when resolving group membership - the first is searching for the authenticated user object and following an attribute to groups it is a member of. The second is to search for group objects of which the authenticated user is a member of. Both methods are supported.