Skip to main content

Directory Access

Access to the OpenLDAP directory service can be achieved in multiple ways.

You usually use command line tools such as ldapsearch,  the Stanford custom Perl module Stanford::Directory,  software development libraries like the Java Naming and Directory Interface,  the UnboundID LDAP SDK,  OpenLDAP's C LDAP client libraries, or python-ldap etc. 

All access is dependent on following our usage policy. Failure to abide by these policies can result in immediate loss of access to the directories.

To connect to a ldap service, you can use one of the two ldap service pools, both of them are hosted on Google Cloud Platform (GCP):

  • ldap://ldap-prod.stanford.edu - for using kerberos service principal authentication (default port 389)
  • ldaps://ldap-simple.stanford.edu - for using service principal name with a password (a.k.a. simple-bind, default port 636)

For on-prem systems that have no direct internet access to port 389:

  • ldap://ldap.stanford.edu

Note we no longer have on-prem ldap servers.  ldap://ldap.stanford.edu is a proxy that sends all ldap queries to the GCP cloud ldap servers.   

If your on-prem systems are behind non-routeable shadow net, or there is a firewall rule to prevent your system from connecting to the cloud ldap servers,  consider to work with networking so that your system can connect  to  ldap://ldap-prod.stanford.edu directly. It will reduce dependencies on campus loadbalancer and campus ldap proxy, and cut down two extra network hops.  There is no on-prem proxy for simple-bind (port 636)

 

Last modified