What Integrates with LDAP?
Find out what LDAP integrations exist in 2025. Learn what software and services currently integrate with LDAP, and sort them by reviews, cost, features, and more. Below is a list of products that LDAP currently integrates with:
-
1
Delinea Cloud Suite
Delinea
Streamline user access to servers from various directory services, including Active Directory, LDAP, and cloud-based platforms like Okta. Uphold the principle of least privilege by implementing just-in-time access and granting only necessary permissions to reduce potential security threats. Detect privilege misuse, counteract potential attacks, and maintain regulatory compliance through comprehensive audit trails and video documentation. Delinea’s cloud-native SaaS solution incorporates zero-trust principles to minimize privileged access misuse and mitigate security vulnerabilities. Enjoy flexible scalability and high performance, accommodating multi-VPC, multi-cloud, and multi-directory scenarios seamlessly. Utilize a single enterprise identity for secure login across diverse platforms, supported by a dynamic, just-in-time privilege elevation model. Centralize the management of security protocols for users, machines, and applications while ensuring consistent application of MFA policies across all critical and regulated systems. Monitor privileged sessions in real-time and possess the capability to swiftly terminate any sessions that appear suspicious, thereby enhancing overall security measures. Additionally, this comprehensive approach not only fortifies your defenses but also promotes a culture of accountability and transparency within your organization. -
2
PYDIO
Pydio
You can empower team collaboration without putting data at risk. Pydio Cells is an open-source, self-hosted document sharing platform with security built in. Do you have complex security and compliance issues in your organization? SaaS solutions might be an option for you. Pydio Cells allows you to fully control your document sharing environment. It combines fast performance, large file transfer sizes, granular cybersecurity, advanced workflow automation, and granular security in an easy-to set-up and easy to support self-hosted platform. Centralized document access via workspaces or cells. Near-zero user learning curve. Secure mobile-native access via Pydio app for Android and iOS. Cells Flows automates common workflows in order to increase productivity. Massive document transfer is seamless. Fully scalable for big data. Secure and easy SSO integration via OPEN ID. Active Directory. LDAP. SAML. All document sources can be unified and bridged using hardened API. Cells Flows automates tedious, time-consuming tasks. -
3
Doccept
Kensium Solutions
Doccept serves as a versatile Document Management System (DMS) designed for multiple users, enabling businesses to efficiently and securely curate their content. For organizations aiming for a "Go Paperless" initiative, having a robust Document Management System is crucial. Managing a plethora of legacy documents scattered across various locations can be daunting for modern enterprises. Many sectors, such as Biotech and Pharmaceuticals, Media, Telecom, Manufacturing, Banking, and Tax/Accounting, necessitate Electronic Document Management. Doccept proves to be beneficial when extensive client information or transaction records must be preserved over extended durations. Additionally, it comes equipped with a comprehensive API guide that facilitates seamless integration with any external application. The system also allows integration with LDAP (Lightweight Directory Access Protocol) and Active Directory, which simplifies user authentication by negating the need to establish separate accounts. This capability enhances operational efficiency, making document management more streamlined and secure for organizations. -
4
WiKID Authentication System
WiKID Systems
$2.00/month/ user Our latest release makes it easy to meet PCI-DSS3.2. WiKID two-factor authentication is now available for service and privileged accounts. Instead of sharing passwords and keeping them in spreadsheets or vaults, you can use WiKID two factor authentication. Stop attackers from escalating to administrator rights by preventing pass-the-hash attacks. Learn how to set it all up. The Enterprise version is available for up to five users. This version is ideal for small businesses and large enterprises that require extended testing. This Enterprise version is not crippleware. Broad protocol support - RADIUS and LDAP, TACACS+ and SAML, native Active Directory WIKID is compatible with all remote access and privileged access management tools such as Cisco, Checkpoint and Fortinet. It also works with all enterprise-class VPN solutions, IPSec or PPTP. We have helped hundreds of organizations implement two factor authentication using standard protocols. Get our eGuide to learn how to integrate Active Directory for authorization. -
5
Kallithea
Kallithea
Kallithea, an initiative under the Software Freedom Conservancy, is a Free Software source code management system licensed under GPLv3 that accommodates two prominent version control systems, Mercurial and Git, featuring a user-friendly web interface for both users and administrators. This versatile tool allows for installation on personal servers, enabling the hosting of repositories tailored to your preferred version control system. It supports both Mercurial and Git wire protocols, which can be accessed securely via HTTPS and SSH. The robust access management system empowers you to define user permissions for repository access and their allowed actions. Moreover, all requests are authenticated and logged, providing administrators with the means to monitor user activities effectively. Kallithea also includes LDAP support, facilitating the integration of your existing authentication mechanisms. Additionally, you can connect your Kallithea instance with any issue tracker of your choice through the JSON-RPC API and the available extensions interface, enhancing its functionality for project management. With these features, Kallithea stands out as a comprehensive solution for source code management. -
6
i-PRO Video Insight
Panasonic i-PRO Sensing Solutions
Video Insight stands out as an efficient yet user-friendly enterprise Video Management System, featuring a new plug-in architecture that boosts scalability and enhances functionality. This dynamic VMS solution seamlessly integrates with our MonitorCast Access Control platform, providing exceptional system management and control while allowing for limitless scalability. Notably, VI7 incurs no licensing fees when paired with i-PRO Extreme cameras, establishing it as the most economical enterprise-level VMS option on the market. Furthermore, Video Insight offers a comprehensive suite of robust features tailored for enterprises, such as Health Monitor, automated failover capabilities, and support for an unlimited number of clients and users alongside active directory/LDAP integration. With its 64-bit processing capabilities, VI accommodates an impressive number of cameras per server, ensuring unlimited scalability and facilitating simple integration with legacy systems, while also allowing for centralized system administration and much more, thereby making it a top choice for organizations looking to enhance their video management capabilities. -
7
Symas LMDB
Symas Corporation
Symas LMDB is an incredibly swift and memory-efficient database that we created specifically for the OpenLDAP Project. Utilizing memory-mapped files, it achieves the read speed typical of purely in-memory databases while also providing the durability associated with traditional disk-based systems. In essence, despite its modest size of just 32KB of object code, LMDB packs a significant punch; it is indeed the perfect 32KB. The compact nature and efficiency of LMDB are integral to its remarkable capabilities. For those integrating LMDB into their applications, Symas provides fixed-price commercial support. Development is actively carried out in the mdb.master branch of the OpenLDAP Project’s git repository. Moreover, LMDB has garnered attention across numerous impressive products and publications, highlighting its versatility and effectiveness in various contexts. Its widespread recognition further cements its status as a vital tool for developers. -
8
Axiom Protect
Axiom Protect
Enhance your various IT infrastructures, whether they are on-premise, cloud, or hybrid, by integrating multifactor security tailored to fit the unique requirements of each system, service, workflow, and user preference. Centralized management ensures compliance with business objectives and regulatory standards through well-defined policies and settings, allowing for seamless customization with just a few clicks. The system features a built-in complex password source that synchronizes with external LDAP or Active Directory for user and operator consolidation. By leveraging the trust established through users' devices, the authentication process becomes both more flexible and robust. Accommodating multiple users on a single device or allowing a single user to access multiple devices is essential for business operations, and this can be achieved effortlessly with the right platform. Ultimately, all aspects of your security revolve around DATA, ensuring protection for data at rest and in transit across mobile, web, IoT devices, servers, files, and databases. Tailor your security measures with varying grades, key lengths, and algorithms without the need for costly VPN solutions. The availability of SDKs and APIs enhances accessibility, while achieving over 99% accuracy for building your electronic Know Your Customer (eKYC) or remote access authentication is made possible through fully AI and deep learning-driven facial biometrics. This level of innovation positions your organization at the forefront of security technology. -
9
SageVue
Biamp
SageVue provides instant visual insights into the status of your system's health. For those seeking detailed analysis, granular options are available as well. It enables you to navigate through subnets effortlessly, allowing management of all your systems from a unified administrative console. With SageVue, you have the ability to perform remote firmware updates, whether on individual devices or in bulk, based on your preferences. You can select from the latest firmware versions and, if necessary, reboot specific devices directly through SageVue. This platform puts you in the driver’s seat regarding system management. It seamlessly integrates with LDAP systems, simplifying the user administration process significantly. You can correlate LDAP groups with user roles in SageVue and specify detailed access permissions. Additionally, SageVue allows for direct configuration of Tesira VoIP-enabled devices without the need for additional software. If you're set to embrace SageVue, rest assured that our support team is ready to assist you every step of the way, ensuring a smooth transition. -
10
Roundcube
Roundcube
A web-based multilingual IMAP client featuring a user interface that mimics that of a traditional application. This client encompasses all essential email functionalities, such as MIME support, an address book, folder management, message searching, and spell checking. It also allows for efficient message handling through drag-and-drop features. Users benefit from a comprehensive address book that includes group options and LDAP connectors, as well as pre-defined response templates. Its responsive design ensures compatibility across multiple devices. Roundcube is utilized by thousands of services that offer webmail solutions to millions of users, and we take pride in seeing our application widely adopted. We firmly believe that having Open Source software for vital communication tasks is crucial for society as a whole. Below is a compilation of services that not only implement but also contribute to the development of Roundcube, highlighting how their usage supports the continuous enhancement of our webmail software, making it available at no cost to everyone. These collaborative efforts are fundamental to our mission of keeping the software updated and accessible to all. -
11
Cherokee
Cherokee
Cherokee stands out as a cutting-edge, feature-laden, ultra-fast, and user-friendly open source web server tailored for the demands of the next generation of secure, highly concurrent web applications. Configuration is seamlessly managed through Cherokee-Admin, an elegant and robust web interface that simplifies the setup process. This server is compatible with a wide array of popular web technologies such as FastCGI, SCGI, PHP, uWSGI, SSI, CGI, LDAP, TLS/SSL, HTTP proxying, video streaming, and content caching, among others. It operates efficiently on platforms like Linux, Mac OS X, Solaris, and BSD, showcasing remarkable lightweight performance and exceptional stability. One of its standout features is the intuitive cherokee-admin interface, which offers a hassle-free way to configure every aspect of the server without the complexities of text file syntax. This focus on user experience makes Cherokee an attractive option for developers seeking both power and ease of use. Additionally, the ongoing development and community support further enhance its capabilities, ensuring it remains relevant in the evolving landscape of web technologies. -
12
Vivi
Vivi
Connect seamlessly to your user database using LDAP and SAML, allowing for bulk configuration and updates, while also managing emergency broadcasts and digital signage. Whether you have a single display in a classroom or 10,000 displays spread across multiple campuses, Vivi offers flexibility. In a Vivi classroom environment, teachers have the freedom to move around, engaging with both the display and their students from any location, which significantly boosts student participation. This approach transforms the traditional classroom into a more interactive learning space, encouraging student involvement and ownership of their education. Vivi is compatible with virtually every device and display, making it incredibly user-friendly. With teacher approval, students can showcase their work, facilitating immediate feedback and creating a more student-centered learning experience that is both interactive and empowering. Notably, up to four students can present their work on a display simultaneously, promoting collaboration as they compare and discuss their different methods. This collaborative atmosphere fosters deeper learning and encourages critical thinking among students. -
13
ProMDM
ProMDM
ProMDM provides mobile device management solutions that provide end-to-end control over all mobile devices across the IT infrastructure. It uses standard MDM specifications for iOS and Android devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Management of Dynamic Groups based on AD/LDAP group, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automate administrative tasks with the Health check service Administration of the role base SSO with Client Certificate Authentication to Exchange, Sharepoint, and Web Sites iOS SSO with Kerberos Safari and Native Apps (integration with ADFS, websites directly) MAM - Mobile App Management Samsung KNOX support Document management - Managed Media Support Photo sync for Android Tracking and GPS location Android for Work Support (ProMDM is a Google Partner certified) -
14
Kamailio
Kamailio
Kamailio® is an open-source SIP server, which evolved from the earlier OpenSER and SER, and is distributed under GPLv2+, capable of managing thousands of call setups each second. This robust platform can be utilized for constructing extensive systems for VoIP, real-time communication, presence, WebRTC, instant messaging, and various other applications. Additionally, Kamailio is well-suited for scaling SIP-to-PSTN gateways, PBX systems, or media servers such as Asterisk™, FreeSWITCH™, or SEMS with ease. Its extensive feature set includes support for asynchronous TCP, UDP, and SCTP, secure communication through TLS for voice, video, and text, as well as WebSocket compatibility for WebRTC. The server supports both IPv4 and IPv6, offers simple instant messaging and presence capabilities with an integrated XCAP server and MSRP relay, and enables asynchronous operations. Furthermore, it includes IMS extensions for VoLTE, ENUM functionality, DID and least cost routing, load balancing, and routing failover. Kamailio also provides comprehensive accounting, authentication, and authorization features, while supporting a variety of backend systems, including MySQL, Postgres, Oracle, Radius, LDAP, Redis, Cassandra, MongoDB, and Memcached. All these capabilities make Kamailio a versatile choice for modern communication infrastructures. -
15
AdRestore
Microsoft
Windows Server 2003 provides a feature for restoring deleted objects, known as "tombstoned" items, through a command-line utility that lists these objects within a domain and allows for their restoration. The utility's source code is derived from examples found in the Microsoft Platform SDK. Additionally, ADInsight serves as a real-time monitoring tool based on LDAP (Lightweight Directory Access Protocol) specifically designed for diagnosing issues with Active Directory client applications. By utilizing in-depth tracing of the interactions between Active Directory clients and servers, it helps resolve various issues related to Windows authentication, Exchange, DNS, and more. Unlike conventional network monitoring tools, ADInsight employs DLL injection methods to capture and analyze all client-side API calls made to the Wldap32.dll library, which underpins Active Directory APIs like LDAP and ADSI, including those that do not lead to server communication. This capability allows administrators to gain a comprehensive view of client-side operations and troubleshoot effectively. Through its detailed insights, ADInsight enhances the overall management and resolution of Active Directory-related challenges. -
16
Skillmine Authenticator
Skillmine Technology Consulting
All Users, All Apps, All Devices, Just One Authenticator! AUTH is a unified authentication platform that supports all major protocols and can be integrated with enterprise applications, partners applications, and social media platforms without making any changes. Use Skillmine Authenticator to centralize authentication and simplify access management across multiple applications in an organization and improve the security of the user login process. 1. Supports messaging and MFA - Provides more layers of security, assures customer identity, and meets regulatory compliance. 2. Offers KYC and API proxy - This lets you streamline communication by providing an interface that offers simpler options. 3. Simplifies access mechanisms - Improves user experience with secure access by capturing login events and enables better business outcomes. 4. Supports Captcha - Keeps the internet spam-free and makes customers’ experience better. 5. Integration with payment gateways - Ensures real-time transaction processing that is secure & trustworthy, defends companies against any potential abuse or fraud. 6. User management and security - Admins may regulate user access, on-board and on-board users to & from IT resources using user mgt. -
17
Courier
Double Precision, Inc.
FreeThe Courier mail transfer agent (MTA) serves as a comprehensive mail and groupware server that utilizes widely recognized protocols, including ESMTP, IMAP, POP3, LDAP, SSL, and HTTP. Within a unified framework, Courier delivers a range of services, such as ESMTP, IMAP, POP3, webmail, and mailing list functionalities, allowing users to easily enable or disable specific components as needed. Recently, the Courier mail server has introduced fundamental web-based calendaring and scheduling features within its webmail module, with plans for more sophisticated groupware calendaring capabilities to come shortly. Notably, the source code for the Courier mail server is designed to compile on most POSIX-compliant operating systems that utilize Linux or BSD-derived kernels, and it can also be successfully compiled on Solaris and AIX systems, provided users utilize the appropriate freeware add-on tools from Sun or IBM. The development of the Courier mail server is rooted in a combination of several interrelated projects that converged into its current form, and it also incorporates SMTP extensions specifically aimed at enhancing mailing list management functionality. In this way, Courier not only serves as a versatile mail server but also as a collaborative tool for users seeking effective communication solutions. -
18
Redactive
Redactive
Redactive's developer platform eliminates the need for developers to acquire specialized data engineering expertise, simplifying the process of creating scalable and secure AI-driven applications for both customer engagement and employee productivity. Designed with the security requirements of enterprises in mind, it enables you to expedite your journey to production. There’s no need to overhaul your permission models simply because you are integrating AI into your organization. Redactive consistently honors the access controls established by your data sources, and our data pipeline is designed to avoid the storage of your final documents, thereby minimizing risks associated with downstream technology providers. With a comprehensive suite of pre-built data connectors and reusable authentication flows, Redactive seamlessly integrates with a continually expanding range of tools, complemented by custom connectors and LDAP/IdP provider integrations, ensuring that you can effectively support your AI initiatives regardless of your existing architecture. This flexibility allows businesses to innovate rapidly while maintaining robust security standards. -
19
The KX Delta Platform, a high-performance data management system for enterprises, is designed to capture, analyze, and store real-time data and historical data. Built on kdb+ - the world's most popular time-series data base - it offers flexible configuration options to support key deployment requirements such as redundancy and load balancing. It also ensures high availability. Robust security measures, such as LDAP authorization and data encryption, ensure strict compliance to data sensitivity and security requirements. The platform allows users to visualize data using a dashboard builder and interactive data playback. It also generates reports automatically. This platform is a powerful tool for program management. It allows for the management, manipulation and exploration of large real-time and historic datasets. Processing is done at high speeds to support mission critical applications.
-
20
MemberProtect
InetSolution
MemberProtect is tailored for professional developers to seamlessly incorporate into secure digital platforms such as ACH, Online Banking, and wire transfer systems. It stands as the most reliable framework for user authentication, data encryption, and user management within the banking and credit union sectors today. Utilizing a roles and privileges model, it accommodates millions of users and organizations while offering highly detailed application security. Its robust encryption capabilities secure databases down to the column level and extend to encrypting email communications and flat files stored across your network. Additionally, it maintains comprehensive logging, capturing even unsuccessful data access attempts, which aids in safeguarding member information against hackers and unauthorized personnel, effectively surpassing the protective measures of firewalls, SSL, and operating systems. By utilizing MemberProtect, developers can establish secure connections with third-party APIs, ensuring extensive compatibility with any web-based system, including integration with LDAP services. This comprehensive approach not only enhances security but also empowers organizations to maintain trust and compliance in a rapidly evolving digital landscape. -
21
CA RFID Asset Management
Tecnologias
Manage and oversee your fixed assets effortlessly using a user-friendly, entirely web-based graphical interface. This application tracks every movement of your assets, providing you with insights on their location and history. Regardless of the type of sensing technology required, our platform supports both stationary and portable readers. User access can be customized based on profiles, offering either read-only or administrative privileges. Additionally, our system is compatible with LDAP for streamlined authentication. You will automatically receive alerts triggered by specific events via email or online notifications, complete with detailed information about the occurrences. This ensures you remain informed about your assets at all times. -
22
PowerTerm WebConnect HostView
Ericom Software
In the current economic landscape, organizations can significantly boost their productivity and adaptability by effectively optimizing their IT resources. Ericom's PowerTerm® WebConnect HostView provides a solution for businesses to achieve this goal through web-to-host emulation. By utilizing the advantages of PC-client access software and server-based computing, organizations can enhance their legacy systems. This platform enables centralized management of configurations and software updates, which helps conserve both time and administrative resources. It also enhances overall productivity by allowing access to critical business applications from anywhere at any time via a standard web browser, irrespective of the user's geographical location. Furthermore, the solution leads to lower expenses related to individual licensing, maintenance, support, and updates. It also includes robust security features such as SSL, SSH, SFTP, integration with Active Directory and LDAP, and support for Single Sign-On, as well as various authentication methods like Kerberos, RADIUS, RSA® SecurID®, and SecurEnvoy® SecureAccess and SecurICE two-factor authentication. The comprehensive nature of these features ensures that organizations can safeguard their data while optimizing their operations. -
23
ecotime
Huntington Business Systems
Ecotime® seamlessly integrates with your current payroll and human resources systems while offering support for active directory, LDAP, and various other third-party single-sign applications. Developed by HBS, the Ecotime® application stands out as a highly robust and adaptable workforce management solution. By leveraging both established industry practices and cutting-edge technologies, Ecotime® ensures top-tier performance. This system is fully scalable, accommodating businesses ranging from just 39 employees to massive organizations with up to 250,000 staff members, thereby allowing it to evolve alongside your company’s needs and is already in use across diverse sectors. Furthermore, Ecotime® empowers all employees by providing them with the flexibility to choose the most suitable method for entering their time based on their individual work circumstances. This adaptability is a key feature that enhances user experience and operational efficiency. -
24
CallBroker Report View
DAFQUEST
CALLBROKER Report View is a server-based application that empowers communications administrators or managers to evaluate and understand their organization's call flow. Tailored to enhance the experience of Cisco Unified Communications users, this reporting tool imposes no restrictions on the number of IP phones or calls, ensuring that communications managers have critical resources to swiftly analyze and effectively make decisions regarding organizational communications. With a web-based interface, CALLBROKER Report View enables detailed oversight of both internal and external call traffic. Specifically designed for call centers, it delivers insights into agent performance and queue statistics, along with a comprehensive array of data that fulfills the needs of any customer relationship management system, including metrics on answered calls, abandoned calls, talk durations, waiting times, and average wait durations. Furthermore, it integrates seamlessly with Cisco CUCM through AXL or LDAP and provides features such as email alerts and the capability to export reports in PDF and Excel formats, thereby facilitating enhanced operational efficiency and decision-making processes. The versatility and depth of analysis provided by CALLBROKER Report View make it an invaluable asset for organizations looking to optimize their communication strategies. -
25
SecureIdentity MFA
SecurEnvoy
A simple password and username approach is not enough to protect your business' sensitive data. Your private data is vulnerable to attack if log-ins are compromised in a matter of minutes. SecureIdentity provides information about the identity, device, and data of each user. This allows you to prove who is doing what at all times. MFA is the best option for privacy and layered data security. Our MFA solution integrates seamlessly into Microsoft's Active Directory or other LDAP solutions. This allows you to reutilize existing authentication database infrastructure without having to re-architect and deploy, backup, and manage a secondary user base. We believe that users should be able choose any device they want to use as their authentication token. This could be their phone, tablet, laptop, or desk phone. -
26
S-Filer Portal
OKIOK Data
S-Filer Portal™ offers a comprehensive on-premise solution tailored to cater to the secure file transfer, storage, and sharing needs of both large and small organizations. This platform encompasses features typically present in more costly Managed Secure File Transfer (MFT) and Enterprise File Sharing and Synchronization (EFSS) solutions. Designed specifically for enterprise applications, S-Filer Portal surpasses personal file-sharing alternatives in terms of security and manageability. Files are securely stored in encrypted virtual vaults utilizing AES 256 encryption, with secure transfers facilitated through SSL/TLS protocols and optional end-to-end encryption. Additionally, the system boasts seamless integration with Active Directory and LDAP, enabling Single Sign-On for internal users, while external user management and authentication occur within distinct authentication domains. The robust architecture of S-Filer Portal ensures that organizations can confidently address their file transfer and sharing requirements.