• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

What is LDAP?

The Lightweight Directory Access Protocol (LDAP) is a standard protocol for maintaining and accessing directory services across a network. A directory service may be thought of as a phone book for various network resources such as files, printers, users, devices, and servers.

For example, an organization may use a directory to keep information about all of its printers. LDAP allows users to search for a certain printer, find it on the network, and securely connect to it.

LDAP is commonly used for creating central authentication servers. These servers store usernames and passwords for all users on a network. Any and all applications and services can utilize the LDAP server to authenticate and authorize users.

How does LDAP work?

LDAP operates by establishing a directory storage technique that allows records to be added, deleted, and modified. It also allows for the search of such data, which facilitates user authentication and authorization to resources.

LDAP has three key functions:

  • Update: This covers adding, removing, or changing directory information.
  • Query: This involves finding and comparing directory information.
  • Authenticate: The primary authentication functions are binding and unbinding; a third action, abandon, prevents a server from finishing an activity. 

Understanding LDAP components

The Lightweight Directory Access Protocol (LDAP) is a protocol for accessing and maintaining directory services via a network. The Directory Information Tree (DIT) is a major component of LDAP, which organizes directory data in a hierarchical structure similar to a tree, with entries ordered from the root down to individual objects. Each entry in the DIT is identified by a Distinguished Name (DN), which is unique to the entry's location within the directory tree. LDAP also makes use of Attributes, which are the data fields linked with each entry, such as usernames, passwords, email addresses, and other pertinent information. These properties are specified by Object Classes, which specify the types of directory entries and the attributes they can have. The LDAP schema regulates the directory's structure by providing the object classes and characteristics that can be used in it.  

LDAP Bind is the action that authenticates a user before allowing them to access the directory, guaranteeing safe access to sensitive information. Furthermore, LDAP operations such as search, compare, add, remove, and edit enable users to interact with and alter directory data. These components constitute the core of LDAP, allowing for the efficient and secure management of directory services across several applications and systems. 

What is LDAP authentication?

LDAP authentication is the process of validating users and passwords maintained in a directory service such as OpenLDAP or Microsoft Active Directory. Administrators can create user accounts in a directory and provide them rights.

When a user attempts to access a resource, a request is issued to the LDAP authentication server. The LDAP server compares the entered username and password to the data in the directory. If there is a match, it determines if the user has permission to access the requested resource.

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy