Skip to content

SSO and LDAP

Under Administration > Settings > Extensions > SSO and LDAP, you configure LDAP authentication and Single Sign-On (SSO) for calServer. The plugin supports Microsoft Active Directory, OpenLDAP, and SAML-based SSO via Azure AD (Entra ID).


LDAP Configuration

LDAP Configuration

Connection Settings

Field Description
Enable LDAP Activates or deactivates the LDAP integration.
Directory Server Selection of the directory service: Microsoft Active Directory or OpenLDAP.
Domains Domain(s) of the LDAP server (e.g., ldap.example.com).
Port Port of the LDAP server (default: 389 unencrypted, 636 for SSL).
Base DN Starting point in the LDAP directory tree for user and group searches.
Bind DN User with which calServer authenticates to the LDAP server.
Account Suffix Suffix for usernames during login (e.g., @ldap.example.com).
Login Field LDAP attribute for the username (e.g., uid or sAMAccountName).
Admin Username Administration account for LDAP management.
Admin Password Associated password.

Security Options

Field Description
Follow Referrals Enables following referrals to other LDAP servers.
SSL Encrypted communication via SSL.
TLS Encrypted communication via TLS (STARTTLS).

SSO Options

Field Description
Login with SSO Activates Single Sign-On for automatic login.
Upload krb5 file Upload of the Kerberos configuration file (krb5.conf) for SSO.

Actions

Action Description
Save Applies the LDAP configuration.
Test Connection Tests the reachability of the LDAP server.
Sync all users Synchronizes all users between LDAP and calServer.

Set Up SAML SSO with Azure AD

The following configuration steps are required to set up SAML-based SSO with Microsoft Azure AD (Entra ID).

Register Application in Azure AD

  1. Sign in to the Azure Portal.
  2. Navigate to Entra Admin Center > Enterprise Applications > New Application.
  3. Select Create your own application.
  4. Assign a name (e.g., "calServer SSO") and select Integrate any other application not found in the gallery.

Configure SAML in Azure AD

  1. Open the created application under Enterprise Applications.
  2. Navigate to Set up SSO > Get started > SAML.
  3. Enter the SAML URLs:
    • Identifier (Entity ID): https://<your-domain>/auth/saml/metadata
    • Reply URL: https://<your-domain>/auth/saml/login
    • Sign-on URL (optional): https://<your-domain>/auth/saml/sso
  4. Save the settings.

Customize Attributes and Claims

Add the following custom claims under Attributes & Claims:

Claim Source Attribute
company user.companyname
email user.mail
lastname user.surname
firstname user.givenname
phone user.mobilephone

Configure LDAP Mapping in calServer

Sign in as an administrator in calServer and configure the attribute mapping under LDAP Settings:

calServer Field SAML Attribute
First Name firstname
Last Name lastname
Email email
Phone phone
Company firm

Assign Users and Groups

  1. Open the application in Azure AD.
  2. Navigate to Users and groups.
  3. Assign the desired users or groups.

Warning

Group claims in the SAML response require a Microsoft Entra ID P1 or P2 license. The Free and Basic editions do not support group claims.


Notes

  • Test the LDAP connection after each configuration change via the Test Connection button.
  • If there are problems with SSO login, check the Azure logs and the calServer configuration.
  • Groups in calServer can be used to manage customer accounts. Users in a group automatically receive access to the associated customers.