Skip to main content
Skip table of contents

Google Cloud Directory connection

This guide explains how to configure an LDAP client to connect to Google Cloud Directory using a secure connection. Even without prior knowledge, you will be guided through the steps necessary to carry out the configuration correctly.

Prerequisites

  1. Google Cloud account: Make sure you have access to a Google Cloud project with Google Cloud Directory configured.

  2. LDAP certificate: You will need to import the certificate to ensure a secure connection between the client and Google Cloud Directory.

  3. Authentication enabled in Google Cloud: To make the LDAP connection, an LDAP client needs to be configured in the Google Cloud console.

Information required for configuration

  1. Domain Name: Enter the domain that will be used for LDAP queries.

  2. Enable SSL: Enable this option to ensure that the connection to the domain controller is made securely.

    • Why use it: SSL (Secure Sockets Layer) protects communication by encrypting the data sent between the client and the LDAP server. It is highly recommended to enable SSL for all LDAP connections.

  3. Server Address: This is the address that will be used to connect the LDAP client to Google Cloud Directory. It can be an IP or the name of the server.

Example: ldap.googlecloud.com

  1. Port (default: 636 for LDAP SSL): The default communication port for a secure LDAP connection (SSL) is 636. If you are setting up a connection without SSL, the default port will be 389.

  2. Timeout(s): The timeout defines the waiting time (in seconds) for the client to receive a response from the LDAP server during a query. Common values are 30 or 60 seconds.

  3. Base DN: The Base DN (Distinguished Name) specifies the starting point for searches within the LDAP domain hierarchy.

Example: DC=example,DC=com

If you don't know which Base DN to use, consult your domain administrator or the Google Cloud Directory documentation.

  1. Import Certificate: To guarantee the security of the connection, it is necessary to import the certificate generated in Google Cloud after creating the LDAP client. This certificate is available for download from the Google Cloud Directory console, under Authentication > Certificates.

How to do it?

  1. After configuring the LDAP client, navigate to the Authentication section in Google Cloud Console

  2. Download the certificate file in .zip format

  3. Import the certificate into the LDAP client. The path to the file must be specified during configuration

Make sure you keep the certificate up to date and secure.

  1. Connection Test: After configuring all the parameters, it is advisable to carry out a Connection Test. This test checks that the connection between the LDAP client and Google Cloud Directory is working correctly. If there are connection problems, check the server address, port settings and SSL certificate.

Configuration Examples

Example with SSL Enabled

TEXT
Domain name: example.com
Server Address: ldap.googlecloud.com
Port: 636
Enable SSL: Yes
Timeout: 60s
Base DN: DC=example,DC=com
Certificate: Certificate_file_path.zip

Example without SSL

TEXT
Domain name: example.com
Server Address: ldap.googlecloud.com
Port: 389
Enable SSL: No
Timeout: 60s
Base DN: DC=example,DC=com

{{component-feedback-article}}

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.