Configure LDAP authentication
As a platform administrator, you can configure LDAP as the source for account authentication information for Ansible Automation Platform users.
About this task Copy linkLink copied!
If the LDAP server you want to connect to has a certificate that is self-signed or signed by an internal certificate authority (CA), the CA certificate must be added to the system’s trusted CAs. Otherwise, connection to the LDAP server will result in an error that the certificate issuer is not recognized.
Your LDAP certificate is not automatically migrated if you use the default Red Hat Enterprise Linux truststore. If you are upgrading Ansible Automation Platform and your LDAP authentication relies on a certificate added to the system’s truststore, this LDAP certificate configuration is not automatically migrated for you to platform gateway in Ansible Automation Platform 2.6.
- For upgrades from Ansible Automation Platform 2.4 to Ansible Automation Platform 2.6:
- The migration of all authenticator configurations from automation controller to platform gateway are automated. This includes moving third-party authentication configuration and sensitive configuration data, such as SAML private keys or OAuth secret keys, from automation controller to platform gateway. However, if you are using custom LDAP certificates you still need to complete the following procedure for these certificates.
- The
is_superuserandis_system_auditorflags in yourLDAP AUTH_LDAP_USER_FLAGS_BY_GROUPsettings are successfully migrated to the new platform gateway. However, theis_active flagis not available in platform gateway and therefore is not migrated. Instead you can use a deny rule to prevent access to the system by users.
- For upgrades from Ansible Automation Platform 2.5 to Ansible Automation Platform 2.6: Authenticator configurations are not automatically migrated from automation controller. If you configured authentication in Ansible Automation Platform 2.5, those settings remain as currently configured after upgrading to 2.6. If you used a custom certificate in 2.5 for LDAP you need to migrate that as well.
Procedure Copy linkLink copied!
What to do next Copy linkLink copied!
To control which users are allowed into the Ansible Automation Platform server, and placed into Ansible Automation Platform organizations or teams based on their attributes (such as username and email address) or to what groups they belong, continue to Mapping.
Import a certificate authority in automation controller for LDAPS integration Copy linkLink copied!
You can authenticate to the automation controller server by using LDAP. However, if you change to using LDAPS (LDAP over SSL/TLS) to authenticate and the TLS certificate is not trusted by platform gateway, it fails with an error such as:
About this task Copy linkLink copied!
2025-08-26 16:40:56,141 WARNING django_auth_ldap Caught LDAPError while authenticating: SERVER_DOWN({'result': -1, 'desc': "Can't contact LDAP server", 'ctrls': [], 'info': 'error:0A000086:SSL routines::certificate verify failed (self-signed certificate)'})
To get Ansible Automation Platform to trust the certificate coming from LDAP, perform the following procedure on all platform gateway instances.